Stormshield SN510: Business Continuity in Complex Architectures

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

MID-SIZE ORGANIZATIONS

BUSINESS CONTINUITY IN COMPLEX ARCHITECTURES

Stormshield SN510
N E TWOR K S EC U RITY I E N D P O I N T S EC U R I T Y I D ATA S EC U R I T Y
Stormshield SN510
THE SECURITY SOLUTION IDEAL FOR MID-SIZE
BUSINESSES AND LARGE AGENCIES.

MID-SIZE BUSINESSES
INTEGRATE YOUR SECURITY SOLUTION EASILY INTO AN AND LARGE AGENCIES
EXISTING INFRASTRUCTURE
Thanks to their advanced networking features, Stormshield
Network Security appliances adapt to your infrastructure Ensure the continuity of your
seamlessly and leave no impact. business
All protection technologies needed for
responding to the most sophisticated
attacks are embedded in the entire
range.
BENEFIT FROM THE BEST OF BREED IN UTM
Stay in control of your internet
At Stormshield, we have taken great care in selecting our partners, usage
who are widely recognized and leaders in their respective fields, Thanks to advanced filtering and the
so that we can offer you the best protection against modern management of quality of service,
threats. you can define the way you want the
Internet to be used.

Manage vulnerabilities
Obsolete or vulnerable applications on
STAY COMPLIANT WITH REGULATORY REQUIREMENTS workstations and servers are detec-
By enabling the local archiving of logs, you will be complying with ted in real time.
regulations regarding the retention of Internet communication Save time
data. The administration interface on Storm-
shield Network Security products has
been designed to be ergonomic and
intuitive in order to assist you in secu-
ring your corporate network quickly
KEEP UP WITH GROWING MOBILITY WHILE STAYING SAFE and with zero errors.
The SSL VPN on Stormshield Network Security solutions,
compatible with all operating systems (Android, Apple, Windows,
etc.), offers your mobile users a secure connection to all the
resources on your corporate network, just as if they were
connected to the local network.

OPTIMIZE YOUR INTERNET BANDWIDTH


Enhance user experience and bandwidth consumption while
surfing the net using the HTTP proxy cache feature.
Technical
specifications
USAGE CONTROL PERFORMANCE*
Firewall/IPS/IDS mode, identity-based firewall, appli-
cation firewall, Microsoft Services Firewall, detection Firewall throughput (1518 byte UDP) 5 Gbps
and control of the use of mobile terminals, appli- IPS throughput (1518 byte UDP) 3 Gbps
cation inventory (option), vulnerability detection IPS throughput (1 Mbyte HTTP files) 1.7 Gbps
(option), URL filtering (embedded database or cloud
Antivirus throughput 850 Mbps
mode), transparent authentication (Active Directory
SSO Agent, SSL, SPNEGO), multi-user authentication VPN*
in cookie mode (Citrix- TSE), global/local security IPSec throughput - AES128/SHA1 1 Gbps
policy. IPSec throughput - AES256/SHA2 780 Mbps
PROTECTION FROM THREATS Max number of IPSec VPN tunnels 500
Intrusion prevention, protocol scan, application ins-
Number of SSL VPN clients (Portal mode) 75
pection, protection from denial of service attacks
(DoS), protection from SQL injections, protection Number of simultaneous SSL VPN clients 100
from Cross-Site Scripting (XSS), protection from NETWORK CONNECTIVITY
malicious Web2.0 code and scripts, Trojan detec-
Concurrent connections 500,000
tion, detection of interactive connections (botnets,
Command&Control), protection from data evasion, New connections per second 20,000
Advanced management of fragmentation, automatic Number of main gateways (max)/backup (max) 64/64
quarantining in the event of an attack, Antispam and
Number of interfaces
antiphishing: reputation-based analysis heuristic 350
(Agg, Dialup, ethernet, loopback, VLAN, pptp, ...)
engine, embedded antivirus (HTTP, SMTP, POP3, FTP),
detection of unknown malware via sandboxing, SSL CONNECTIVITY
decryption and inspection, VoIP protection (SIP), col- 10/100/1000 interfaces 12
laborative security: adaptation of the filter policy ac-
SYSTEM
cording to security events or detected vulnerabilities.
Max number of filtering rules 8,192
CONFIDENTIALITY
Site-to-site or nomad IPSec VPN, remote SSL VPN Max number of static routes 2,048
access in multi-OS tunnel mode (Windows, Android, Max number of dynamic routes 10,000
iOS, etc), SSL VPN agent configurable centrally (Win- REDUNDANCY
dows), Support for Android/iPhone IPSec VPN.
High Availability (Active/Passive)
NETWORK - INTEGRATION HARDWARE
IPv6, NAT, PAT, transparent (bridge)/routed/hybrid
modes, dynamic routing (RIP, OSPF, BGP), multi-level Local storage 320 Go
internal or external PKI management, internal LDAP Additional Storage >300 Go
directory, explicit proxy, policy-based routing (PBR), MTBF (years) 14.5
QoS management, DHCP client/relay/server, NTP
Racking 1U - 19"
client, DNS proxy-cache, HTTP proxy-cache, high avai-
lability, WAN link redundancy, LACP management, Height x Width x Depth (mm) 44.45 x 440 x 310
Spanning-tree management(RSTP/MSTP). Weight 4.25 kg (9.4 lbs)
MANAGEMENT Packaged Height x Width x Depth (mm) 142 x 590 x 443
Web-based management interface, object-oriented Packaged weight 6,2 kg (13.7 lbs)
security policy, real-time configuration help, firewall
Power supply 100-240V 60-50Hz 3-1.5A
rule counter, more than 15 installation wizards, em-
bedded log reporting and analysis tools, interactive Power consumption 230V 50Hz 34W 0,21A
and customizable reports, sending to syslog, SNMP Fan 2
v1, v2, v3 agent, automated configuration backup. Noise level 55dbA
Non-contractual document. The features mentioned are Thermal dissipation (max) 130 BTU/h
those in version 2.1. Operational temperature 5 to 40C (41 to 104F)
Relative humidity, operating (without condensation) 20% to 90% @ 40C
* Performance is measured in a laboratory and under condi- Storage temperature -30 to 65C (-22 to149F)
tions ideal for version 2.1. Results may vary according to
Relative humidity, storage (without condensation) 5% to 95% @ 60C
test conditions and the software version.
CERTIFICATIONS
Compliance CE/FCC
For security
with high added value

STORMSHIELD NETWORK STORMSHIELD NETWORK KASPERSKY


VULNERABILITY MANAGER* EXTENDED WEB CONTROL* ANTIVIRUS*
Arm yourself with a simple and Monitor how users surf the inter- Protect yourself by getting equip-
powerful vulnerability detection net on your corporate network ped with the best antivirus protec-
tool that leaves no impact on your and optimize your bandwidth tion solution.
information system. consumption by deploying an
effective and high-performance Protection from threats
Vulnerability Management URL filtering solution. The Kaspersky antivirus solution
Based on data passing through the on Stormshield Network Security
appliance, Stormshield Network Prevention of web-based threats appliances is not based merely on
Vulnerability Manager makes an Extended Web Control analyzes a system of malware signatures,
inventory of operating systems, illions of requests in order to conti- but also integrates emulation
applications used and their vulne- nuously evaluate the risk level mechanisms to identify malicious
rabilities. As soon as a vulnerabi- of various websites and to block code proactively.
lity appears on your network, you infected or malicious sites from
will be kept informed. being visited as soon as they are Peripheral protection
detected. Applying an antivirus inspection
Remediation on the traffic of all devices connec-
Stormshield Network Vulnerability Advanced filtering for all ted to the network and relying on
Manager offers a set of dedicated a behavioral analysis technology
The Extended Web Control solution
reports as well as a real-time similar to sandboxing, it allows
can be enabled on the entire range
dashboard that allow you to stay the detection of even unknown
of Stormshield Network Security
in control of your deployment. attacks.
products. You can therefore bene-
fit from an advanced filter solution
regardless of the size of your com- * Option
pany.

Phone
+33 9 69 32 96 29

WWW.STORMSHIELD.EU

Version 1.0 - Copyright Netasq 2015

You might also like