Palo Alto PA-460 Network Security/Firewall Appliance

  • Part: 1666796
  • Model: PAN-PA-460
$8,486.87

Availability

In Stock

  • General Information
    • Manufacturer
    • Palo Alto Networks
    • Manufacturer Website Address
    • http://www.paloaltonetworks.com
    • Brand Name
    • Palo Alto
    • Product Type
    • Network Security/Firewall Appliance

The Palo Alto Networks PA-400 Series, comprising the PA-460, PA-450, PA-440, and PA-410, brings ML-Powered NGFW capabilities to distributed enterprise branch offices, retail locations, and midsize businesses.

The world's first ML-Powered Next-Generation Firewall (NGFW) enables you to prevent unknown threats, see and secure everything-including the Internet of Things (IoT)-and reduce errors with automatic policy recommendations.

The controlling element of the PA-400 Series is PAN-OS®, the same software that runs all Palo Alto Networks NGFWs. PAN-OS natively classifies all traffic, inclusive of applications, threats, and content, and then ties that traffic to the user regardless of location or device type. The application, content, and user-in other words, the elements that run your business-then serve as the basis of your security policies, resulting in improved security posture and reduced incident response times.

Key Security and Connectivity Features | ML-Powered Next-Generation Firewall

  • Embeds machine learning (ML) in the core of the firewall to provide inline signatureless attack prevention for file-based attacks while identifying and immediately stopping never-before-seen phishing attempts.
  • Leverages cloud-based ML processes to push zero-delay signatures and instructions back to the NGFW.
  • Uses behavioral analysis to detect IoT devices and make policy recommendations as part of a cloud-delivered and natively integrated service on the NGFW.
  • Automates policy recommendations that save time and reduce the chance of human error.
Identifies and categorizes all applications, on all ports, all the time, with full Layer 7 inspection
  • Identifies the applications traversing your network irrespective of port, protocol, evasive techniques, or encryption (TLS/SSL).
  • Uses the application, not the port, as the basis for all your safe enablement policy decisions: allow, deny, schedule, inspect, and apply traffic-shaping.
  • Offers the ability to create custom App-ID™ tags for proprietary applications or request App-ID development for new applications from Palo Alto Networks.
  • Identifies all payload data within an application (e.g., files and data patterns) to block malicious files and thwart exfiltration attempts.
  • Creates standard and customized application usage reports, including software-as-a-service (SaaS) reports that provide insight into all sanctioned and unsanctioned SaaS traffic on your network.
  • Enables safe migration of legacy Layer 4 rule sets to App-ID-based rules with built-in Policy Optimizer, giving you a rule set that is more secure and easier to manage.

  • Technical Information
    • Firewall Protection Supported
    • Threat Protection
    • Application Firewall
    • SSL Encrypted Traffic Protection
    • User Authentication
    • Data Loss Prevention
    • URL Filtering
    • DNS Security
    • Secure IPsec VPN Connectivity
    • Zero Day Event
    • IoT Security
    • SaaS Security
    • Encryption Standard
    • 3DES
    • AES (128-bit)
    • AES (192-bit)
    • AES (256-bit)
    • MD5
    • SHA-1
    • SHA-256
    • SHA-384
    • SHA-512
  • Interfaces/Ports
    • Total Number of Ports
    • 8
    • USB
    • Yes
    • Number of Network (RJ-45) Ports
    • 8
  • Network & Communication
    • Ethernet Technology
    • Gigabit Ethernet
    • Network Standard
    • 10/100/1000Base-T
  • Management & Protocols
    • Manageable
    • Yes
  • Power Description
    • Frequency
    • 50 Hz
    • 60 Hz
  • Physical Characteristics
    • Form Factor
    • Desktop
    • Height
    • 44.2 mm
    • Width
    • 205 mm
    • Depth
    • 224.3 mm
    • Weight (Approximate)
    • 2.27 kg