Hillstone SG-6000-T5860 UTM Appliance Hardware UTM Firewall

Hillstone SG-6000-T5860 UTM Appliance Hardware UTM Firewall

USD $1 - $10,000 /Set

Min.Order:1 Set

Supply Ability:
200 Set / Sets per Month
Port:
Shanghai
Payment Terms:
T/T Credit Card

Quick Details View All >

Products Status:
Stock
VPN Support:
Yes
Throughput:
40Gbps
Simultaneous Sessions:
6 million sessions
Certification:
CE
Brand Name:
Hillstone

Shanghai Chu Cheng Information Technology Co., Ltd.

Business Type: Trading Company
Shanghai China
Main Products: Communication Equipment Transmission Equipment ,Access ,Switch ,Router ,Gateway ,WIFI ,RouterExport

Product Details

Hillstone SG-6000-T5860 UTM Appliance Hardware UTM Firewall      

 

Product Description

 

Advanced persistent threats, zero-day exploits, and polymorphic attacks routinely bypass traditional signature-based security. Hillstone’s Intelligent Next-Generation Firewall is an application-aware firewall that continuously monitorsthe network and exposes elusive malware at every stage of the attack. It provides real-time detection and reporting that provide multiple opportunities to stop an attack. It also provides real-time insight into network operations and overall network health. Hillstone’s Intelligent Next-Generation Firewallis designed for mid to large-sized enterprises. It enhances enterprise security, continuity, and visibility while reducing operational cost.

 

Appearance

 

Hillstone SG-6000-T5860 UTM Appliance Hardware UTM Firewall

 

Specifications

 

 Hillstone SG-6000-T5860 UTM Appliance Hardware UTM FirewallHillstone SG-6000-T5860 UTM Appliance Hardware UTM Firewall

 

Highlights

 

Behavior Reputation Index for ProactiveThreat Protection

Perimeter security devices are given one imperfect chance to stop an attack. If they fail in that attempt attackers are free to begin their exploits and perimeter defenses will be completely blind to that activity. Consequently, all organizations have infected hosts inside their networks.

 

Hillstone’ s T-Series Intelligent Next-Generation Firewall continuously monitors the devices connected to the network. It uses machine learning to establish a baseline of normal network activity and it uses big data analytics and mathematical modeling to detect anomalous behavior that represents attacks at multiple stages in the attack lifecycle. This information is displayed on an intuitive dashboard and provides the user withmultiple opportunities to stop the attack.

 

Hillstone’ s T-Series Intelligent Next-Generation Firewall can identify attacks on all operating systems, applications, devices and browsers.It provides visibility into every stage of an ongoing attack from initial compromise to the exfiltration of data. It prioritizes hosts with the greatest security risks and provides contextual information about the threat. Security administrators can drill-down into the attack, including packet captures, to analyze all threat details. Hillstone’ s reporting provides an audit trail of the progression of attacks over time.

Hillstone SG-6000-T5860 UTM Appliance Hardware UTM Firewall

 

Hillstone provides visibility into every stage of an ongoing attack from initial compromise to exfiltration of stolen data. It provides the user with multiple opportunities to stop the attack, which can prevent or significantly mitigate potential losses.

 

Network Health Index for Security Risk Management

Hillstone’s patented Network Health Index quantifies the health status of your network. It monitors threat information, application utilization, Internet access, device utilization, network nodes and
associated services to calculate the overall health of the network. It provides a multi-dimensional real-time assessment of your network’ s availability, risk factors, and developing threats. An intuitive dashboard allows IT to make timely security policy adjustments to mitigate threats and maintain network uptime.

 

Superior User Experience

Hillstone’ s Intelligent Next-Generation Firewall provides visibility and control of: network applications, network traffic, users and groups, bandwidth utilization, network health, malicious activity, abnormal behavior, risk factors, developing threats and many more network and security attributes. It provides extensive tools for monitoring, reporting, logging, provisioning, and operations management.

 

Intelligent Multi-Vector Processor Architecture(iMVP)

Hillstone’ s Intelligent Multi-Vector Processor Architecture (iMVP) employs multi-dimensional parallel processing via a multi-core security processor running in parallel with Intel x86 processors.
Multi-core processors handle data forwarding, next generation security and related functions. Intel x86 processors handle data mining and correlation for intelligent analysis and presentation of
Behavior Risk and Network Health indices. The system delivers superior performance for data transfer, threat protection, data analysis, device management and visibility into security anomalies.

 

Functions

 

Network
               ♦Supports three modes: transparent, routing and hybrid
               ♦Supports source routing, destination routing, source interfacerouting, ISP routing and policy routing
              ♦Supports Static, RIP, RIPv2, OSPF, BGP


Firewall
              ♦Supports NAT and PAT
              ♦Supports VLAN, Vswitch, Vrouter and Virtual-Wire
              ♦Security policies based on security zone, IP address, user,groups, ports, service, applications, objects and time


Application Identification and User Identification
            ♦Application identification based on signature, behavior and associated information
            ♦Application signature database can be updated online in real-time
            ♦Supports user identification through Local, AD, LDAP and Radius authentication servers
            ♦Application identification enhanced by Hillstone Stone Cloud services
            ♦User visibility and management based on user role and organization 

 

Network Health Index (NHI)
           ♦Actively monitors CPU utilization, memory utilization, storage, chassis temperature, CPU temperature, new session per second, concurrent sessions, interface traffic, SNAT port
utilization and other resources
          ♦Actively monitor the connectivity and availability of service links and nodes
          ♦Actively monitor key services, e.g., Web, Mail, FTP, LDAP, DNS, etc.


Behavior Reputation Index (BRI)
          ♦Host and sever behavior baseline by machine-learning
          ♦Risky host and sever identification
          ♦Advanced threat detection and alert


Threat Prevention
          ♦Network layer attack prevention
          ♦Application layer attack prevention
          ♦Malware download prevention
          ♦Trojan prevention

 

VPN
          ♦Supports standard IPSec VPN protocols
          ♦Supports SSL VPN (Optional USB-key)
          ♦Creative PnP VPN® (plug-and-play VPN)
          ♦Supports L2TP over IPSec VPN


Load Balancing
         ♦Supports bidirectional load balancing
         ♦Supports proximity detection and SmartDNS


Intelligent Quality of Service (iQoS)

         ♦Tunnel allocation based on security domain, interface,address, user/user group, service/service group,application/application group, TOS, VLAN

           ♦Supports embedded two layers and eight tunnels
           ♦Supports maximum bandwidth cap and minimum bandwidth guarantee on multi-level tunnels or on a per IP/user basis
          ♦Supports differentiated service according to priority


Analysis and Diagnostic
           ♦Multi-vector full-scale threat detection based on security domain, interface, service, application, user and timeframe
           ♦Package path detection tool graphically depicts packet flow in every module, based on inline inspection, simulated inspection and import detection
           ♦Supports inline packet capture


Visibility
             ♦Real-time and historical views of CPU, memory, traffic,sessions and other system resources
            ♦Real-time user traffic, concurrent sessions and new sessions displayed in pie chart, histogram or trend line
           ♦Business link connectivity and service availability
           ♦Real-time tunnel traffic in pie chart, histogram or trend line
           ♦Real-time warning information
           ♦Historical data comparison and analysis based on user,application and other dimensions
           ♦Real-time visibility of known and unknown threats
           ♦Supports geographic location of threats
           ♦Real-time monitor and chart visibility for risky host and server
           ♦Host and server behavior baseline monitor


Log Auditing
            ♦Logging and auditing of system events, warnings, network traffic and configuration
            ♦Logs may be exported to the console, log server, email, files or terminals


Reporting
               ♦Report on demand or generate periodic reports by date, week and month
               ♦Supports summarized reports of application, traffic, threat and behavior
               ♦Support HTML and PDF report format
               ♦Upload reports automatically or by email and FTP

 

Packaging & Shipping

 

1.Trade terms: FOB,CIF,CFR,etc

2.Price Terms: L/C,D/P,T/T,Western Union,PAYPAL

3.Payment Terms: T/T in advance

4.MOQ:  1 pcs

5.FOB Price:US $1 - 1,000 / Piece

6.Port: Shanghai

7.Lead time: Within 5 working days after receipt payment.

8.Shipment: Express, Air, Sea

9.Supply capability: 200 Piece/Pieces per Week

10.Sample availability: Yes( not free)

11.Package information: carton package with Huawei original package

Hillstone SG-6000-T5860 UTM Appliance Hardware UTM FirewallHillstone SG-6000-T5860 UTM Appliance Hardware UTM Firewall 

 

 

 

Company Information

 

Hillstone SG-6000-T5860 UTM Appliance Hardware UTM Firewall

ChuCheng Information Technology Co., Ltd. , which provides main services in terms of broadband communications and information technology industries, is a research and development, production, sales, service integration, high-tech enterprises. Our products mainly cover the optical signal transmission and access, 

signal transmission and access, photoelectric signal conversion and photoelectric signal and so on.

 

We are now the agent of well-known international brands such as HUAWEI, ZTE, CISCO, ZYXEL,

Grandstream, etc. Our customer include major national telecom carriers, as well as radio and television, 

electricity, mining and other industry professional network users; We have already established a long-term 

friendly and cooperative relations with them. In addition, the company has been actively expanding 

into foreign markets. The products are exported to Europe, America, Southeast Asia, the Middle East as well 

as Japan, Korea and other neighboring countries.

We will constantly improve our service and quality to create a win-win situation.

Please contact us to know details.

 

ShangHai ChuCheng Information and Technology CO.,LTD

AddressRoom 110,No.389 JinWan Road, ShangHai , China

Tel:0086-21-58718070 ext 8024 / +86 13918808126

Fax: 0086-21-58714662

Attn: Lilian Hu

Skype: lilian.hu_2

Contact Supplier

Mr. icegreen guan Chat Now
Telephone
86-21-58718070
Fax
86-21-58714662
Address
No.771,Jian Yuan Road ShangHai ,China Shanghai

You May Like

New Products

Recommended Products

View More View Less

Find Similar Products By Category

Consumer Electronics > Computer Hardware & Software > Firewall & VPN
Categories
Hi~