Palo Alto Networks PA-5260 Data Process Card
In stock
SKU:
PA-5260
- 24×7 remote and on-site support
- Multi-vendor solutions & services
- Local billing in 33+ countries
- Competitive Price
Palo Alto Networks PA-5200 Series ML-Powered NGFWs—the PA-5280, PA-5260, PA-5250, and PA-5220— are ideal for high-speed data center, internet gateway, and service provider deployments. The PA-5200 Series delivers up to 64 Gbps of throughput, using dedicated processing and memory, for the key functional areas of networking, security, threat prevention, and management.
- Ten-time Leader in the Gartner® Magic Quadrant™ for Network Firewalls
- Leader in the Forrester Wave™: Enterprise Firewalls, Q3 2020
- Highest Security Effectiveness score in the 2019 NSS Labs NGFW Test Report, with100% of evasions blocked
- Delivers 5G-native security built to safeguard service provider and enterprise 5G transformation and multi-access edge computing (MEC)
- Extends visibility and security to all devices, including unmanaged IoT devices, without the need to deploy additional sensors
- Supportshighavailabilitywithactive/activeandactive/passive modes
- Delivers predictable performance with security services
ML-Powered Next-Generation Firewall
- Embeds machine learning (ML) in the core of the firewall to provide inline signatureless attackprevention for file-based attackswhile identifying and immediately stopping never-before-seen phishing attempts.
- Leverages cloud-based ML processes to push zero-delay signatures and instructions back to theNGFW.
- Uses behavioral analysis to detect IoT devices and make policy recommendations; cloud-deliveredand natively integrated service on the NGFW.
- Automates policy recommendations that save time and reduce the chance of human error
Identifies and Categorizes All Applications, on All Ports, All the Time, with Full
- Identifies the applications traversing yournetwork irrespective of port, protocol, evasive techniques,or encryption (TLS/SSL).
- Automatically discovers and controls new applications to keep pace with the SaaS explosion with SaaS Security subscription.
- Uses the application, not the port, as the basis for all your safe enablement policy decisions: allow, deny, schedule, inspect, and apply traffic-shaping.
- Offers the ability to create custom App-ID™ tags for proprietary applications or request App-ID development for new applications from Palo Alto Networks.
- Identifies all payload data within the application (e.g., files and data patterns) to block malicious files and thwart data exfiltration attempts.
- Creates standard and customized application usage reports, including software-as-a-service (SaaS) reports that provide insight into all sanctioned and unsanctioned SaaS traffic on your network.
- Enables safe migration of legacy Layer 4 rule sets
Enforces Security for Users at Any Location, on Any Device, While Adapting
- Enables visibility, security policies, reporting, and forensics based on users and groups—not just IPaddresses.
- Easily integrates with a wide range of repositories to leverage user information: wireless LAN controllers, VPNs, directory servers, SIEMs, proxies, and more.
- Allows you to define Dynamic User Groups (DUGs) on the firewall to take time-bound security actionswithout waiting for changes to be applied to user directories.
- Applies consistent policies irrespective of users’ locations (office, home, travel, etc.) and devices (iOSand Android® mobile devices, macOS®, Windows®, Linux desktops, laptops; Citrix and Microsoft VDI and Terminal Servers).
- Prevents corporate credentials from leaking to third-party websites and prevents reuse of stolen
credentials by enabling multi-factorauthentication (MFA) at the network layer for any application
without any application changes.
Memo | PA-5260 |
Firewall throughput (HTTP/appmix) | 49.5/55.2 Gbps |
Threat Prevention throughput (HTTP/appmix) | 25.4/31.4 Gbps |
IPsec VPN throughput | 26.3 Gbps |
Max sessions | 32M |
New sessions per second§ | 505,000 |
Virtual systems (base/max) | 25/225 |