Hillstone SG-6000-T3860 Network Security Appliance UTM Firewall
USD $1 - $10,000 /Set
Min.Order:1 Set
Shanghai Chu Cheng Information Technology Co., Ltd.
Hillstone SG-6000-T3860 Network Security Appliance UTM Firewall
Advanced persistent threats, zero-day exploits, and polymorphic attacks routinely bypass traditional signature-based security. Hillstone’s Intelligent Next-Generation Firewall is an application-aware firewall that continuously monitorsthe network and exposes elusive malware at every stage of the attack. It provides real-time detection and reporting that provide multiple opportunities to stop an attack. It also provides real-time insight into network operations and overall network health. Hillstone’s Intelligent Next-Generation Firewallis designed for mid to large-sized enterprises. It enhances enterprise security, continuity, and visibility while reducing operational cost.
Behavior Reputation Index for ProactiveThreat Protection
Perimeter security devices are given one imperfect chance to stop an attack. If they fail in that attempt attackers are free to begin their exploits and perimeter defenses will be completely blind to that activity. Consequently, all organizations have infected hosts inside their networks.
Hillstone’ s T-Series Intelligent Next-Generation Firewall continuously monitors the devices connected to the network. It uses machine learning to establish a baseline of normal network activity and it uses big data analytics and mathematical modeling to detect anomalous behavior that represents attacks at multiple stages in the attack lifecycle. This information is displayed on an intuitive dashboard and provides the user withmultiple opportunities to stop the attack.
Hillstone’ s T-Series Intelligent Next-Generation Firewall can identify attacks on all operating systems, applications, devices and browsers.It provides visibility into every stage of an ongoing attack from initial compromise to the exfiltration of data. It prioritizes hosts with the greatest security risks and provides contextual information about the threat. Security administrators can drill-down into the attack, including packet captures, to analyze all threat details. Hillstone’ s reporting provides an audit trail of the progression of attacks over time.
Hillstone provides visibility into every stage of an ongoing attack from initial compromise to exfiltration of stolen data. It provides the user with multiple opportunities to stop the attack, which can prevent or significantly mitigate potential losses.
Network Health Index for Security Risk Management
Hillstone’s patented Network Health Index quantifies the health status of your network. It monitors threat information, application utilization, Internet access, device utilization, network nodes and
associated services to calculate the overall health of the network. It provides a multi-dimensional real-time assessment of your network’ s availability, risk factors, and developing threats. An intuitive dashboard allows IT to make timely security policy adjustments to mitigate threats and maintain network uptime.
Superior User Experience
Hillstone’ s Intelligent Next-Generation Firewall provides visibility and control of: network applications, network traffic, users and groups, bandwidth utilization, network health, malicious activity, abnormal behavior, risk factors, developing threats and many more network and security attributes. It provides extensive tools for monitoring, reporting, logging, provisioning, and operations management.
Intelligent Multi-Vector Processor Architecture(iMVP)
Hillstone’ s Intelligent Multi-Vector Processor Architecture (iMVP) employs multi-dimensional parallel processing via a multi-core security processor running in parallel with Intel x86 processors.
Multi-core processors handle data forwarding, next generation security and related functions. Intel x86 processors handle data mining and correlation for intelligent analysis and presentation of
Behavior Risk and Network Health indices. The system delivers superior performance for data transfer, threat protection, data analysis, device management and visibility into security anomalies.
Network
♦Supports three modes: transparent, routing and hybrid
♦Supports source routing, destination routing, source interfacerouting, ISP routing and policy routing
♦Supports Static, RIP, RIPv2, OSPF, BGP
Firewall
♦Supports NAT and PAT
♦Supports VLAN, Vswitch, Vrouter and Virtual-Wire
♦Security policies based on security zone, IP address, user,groups, ports, service, applications, objects and time
Application Identification and User Identification
♦Application identification based on signature, behavior and associated information
♦Application signature database can be updated online in real-time
♦Supports user identification through Local, AD, LDAP and Radius authentication servers
♦Application identification enhanced by Hillstone Stone Cloud services
♦User visibility and management based on user role and organization
Network Health Index (NHI)
♦Actively monitors CPU utilization, memory utilization, storage, chassis temperature, CPU temperature, new session per second, concurrent sessions, interface traffic, SNAT port
utilization and other resources
♦Actively monitor the connectivity and availability of service links and nodes
♦Actively monitor key services, e.g., Web, Mail, FTP, LDAP, DNS, etc.
Behavior Reputation Index (BRI)
♦Host and sever behavior baseline by machine-learning
♦Risky host and sever identification
♦Advanced threat detection and alert
Threat Prevention
♦Network layer attack prevention
♦Application layer attack prevention
♦Malware download prevention
♦Trojan prevention
VPN
♦Supports standard IPSec VPN protocols
♦Supports SSL VPN (Optional USB-key)
♦Creative PnP VPN® (plug-and-play VPN)
♦Supports L2TP over IPSec VPN
Load Balancing
♦Supports bidirectional load balancing
♦Supports proximity detection and SmartDNS
Intelligent Quality of Service (iQoS)
♦Tunnel allocation based on security domain, interface,address, user/user group, service/service group,application/application group, TOS, VLAN
♦Supports embedded two layers and eight tunnels
♦Supports maximum bandwidth cap and minimum bandwidth guarantee on multi-level tunnels or on a per IP/user basis
♦Supports differentiated service according to priority
Analysis and Diagnostic
♦Multi-vector full-scale threat detection based on security domain, interface, service, application, user and timeframe
♦Package path detection tool graphically depicts packet flow in every module, based on inline inspection, simulated inspection and import detection
♦Supports inline packet capture
Visibility
♦Real-time and historical views of CPU, memory, traffic,sessions and other system resources
♦Real-time user traffic, concurrent sessions and new sessions displayed in pie chart, histogram or trend line
♦Business link connectivity and service availability
♦Real-time tunnel traffic in pie chart, histogram or trend line
♦Real-time warning information
♦Historical data comparison and analysis based on user,application and other dimensions
♦Real-time visibility of known and unknown threats
♦Supports geographic location of threats
♦Real-time monitor and chart visibility for risky host and server
♦Host and server behavior baseline monitor
Log Auditing
♦Logging and auditing of system events, warnings, network traffic and configuration
♦Logs may be exported to the console, log server, email, files or terminals
Reporting
♦Report on demand or generate periodic reports by date, week and month
♦Supports summarized reports of application, traffic, threat and behavior
♦Support HTML and PDF report format
♦Upload reports automatically or by email and FTP
1.Trade terms: FOB,CIF,CFR,etc
2.Price Terms: L/C,D/P,T/T,Western Union,PAYPAL
3.Payment Terms: T/T in advance
4.MOQ: 1 pcs
5.FOB Price:US $1 - 1,000 / Piece
6.Port: Shanghai
7.Lead time: Within 5 working days after receipt payment.
8.Shipment: Express, Air, Sea
9.Supply capability: 200 Piece/Pieces per Week
10.Sample availability: Yes( not free)
11.Package information: carton package with Huawei original package
ChuCheng Information Technology Co., Ltd. , which provides main services in terms of broadband communications and information technology industries, is a research and development, production, sales, service integration, high-tech enterprises. Our products mainly cover the optical signal transmission and access,
signal transmission and access, photoelectric signal conversion and photoelectric signal and so on.
We are now the agent of well-known international brands such as HUAWEI, ZTE, CISCO, ZYXEL,
Grandstream, etc. Our customer include major national telecom carriers, as well as radio and television,
electricity, mining and other industry professional network users; We have already established a long-term
friendly and cooperative relations with them. In addition, the company has been actively expanding
into foreign markets. The products are exported to Europe, America, Southeast Asia, the Middle East as well
as Japan, Korea and other neighboring countries.
We will constantly improve our service and quality to create a win-win situation.
Please contact us to know details.
ShangHai ChuCheng Information and Technology CO.,LTD
Address: Room 110,No.389 JinWan Road, ShangHai , China
Tel:0086-21-58718070 ext 8024 / +86 13918808126
Fax: 0086-21-58714662
Attn: Lilian Hu
Skype: lilian.hu_2