SonicWall Introduces Analytics, APs, Firewall, OS
October 02, 2017
By Paula Bernier
Executive Editor, TMC
SonicWall has come out with a flurry of announcements about new products and capabilities. That includes a new analytics offering, a new firewall, new Wi-Fi access points, and new SonicOS features.
SonicWall Cloud Analytics, which is delivered as a service to customers and partners, presents users with a dashboard that provides real-time visibility and alerting related to applications, device activity, network traffic, threats, and user behavior. It enables organizations to monitor, record, analyze, and report security data across multiple SonicWall firewalls and SonicWave wireless access points.
Speaking of firewalls, the new NSA 2650 firewall from SonicWall is for branch and campus applications. It provides threat prevention over 2.5 gigabit Ethernet wired and 802.11ac Wave 2 wireless networks. It features TLS/SSL decryption and deep packet inspection, and multi-engine sandboxing via the Capture Advanced Threat Protection service. And it supports twice the number of DPI connections of the previous-generation NSA 2600 appliance, and 12,000 DPI SSL connections - an increase of 12 times.
The top cyber security threat of 2016 was ransomware, according to the 2017 Annual Threat Report from SonicWall. Ransomware increased by more than 167 times year-over-year to reach 638 million attacks in 2016. Ransomware has been extremely problematic this year as well.
Also new from SonicWall are 802.11ac Wave 2 access points that leverage 4x4 MU-MIMO technology. “The new SonicWave access points give us throughput that matches our wired network,” said Dr. Michael Breen, Dean of Arts at Mary Immaculate College. “Whether someone is on a handheld device or directly wired to the network, the service is indistinguishable. Signal reception is consistently strong over a one-and-a-half-acre site.”
Meanwhile, SonicOS 6.5 delivers more than 50 new features. That includes a new and improved user interface, enhanced threat API capabilities to help businesses build automated security platforms that can leverage third-party threat intelligence feeds, multi-domain authentication, and wireless features that enables security and connectivity for mobile users.
Edited by Mandi Nowitz
Article comments powered by