You are on page 1of 2

PROPOSED DATA CENTER INTERNET/NETWORK FIREWALL SECURITY STUDY AS OF APRIL 17, 2018

User and Adaptable,


Central, Powerful High Plug and Play Deep Packet Multi-
DESCRIPTION Application AET Protection Convertible UNIT COST
Management Availability Deployment Inspection Tenancy
Control Architecture
USED BULK
DELL SONIC WALL HARDWARE √ √ √ √ √ √ √ 1,500,000.00
RESOURCES
SOPHOS √ √ √ √ √ √ √ √ 750,000.00
NEEDS MORE
FORTINET √ √ √ √ √ √ 1,200,000.00
CONFIGURATION

SANGFOR √ √ √ √ √ √ √ √ 385,000.00

FOOTNOTES: A firewall protects your computer by acting as a gate through which both all data must pass. By blocking certain kinds of traffic, the firewall protects your computer or ne
unauthorized users and safeguards your data from attack.

Information is vulnerable on disk and in transit. Networks break down data into units called "network packets." "Packet sniffers" can record them. By spoofing IP address
intercept traffic, sending you fake data and commands.

Firewalls use a variety of techniques to protect against attacks. As proxy servers, firewalls mask your IP address and limit traffic types. External computers communicate
instead. As circuit-level gateways, firewalls limit connections to trusted networks only. Packet-filtering firewalls examine each packet, rejecting those that fail security tes

Prepared by: Noted by:


REMARKS

ANNUAL COMPREHENSIVE
SUBSCRIPTION

ANNUAL SUBSCRIPTION

ANNUAL SUBSCRIPTION

1 YEAR COVERAGE MAINTENANCE OUR


EXISTING SOFTWARE SUPPLIER FOR
DEPED

the firewall protects your computer or network from 

can record them. By spoofing IP addresses, attackers 

 types. External computers communicate with them, 
cket, rejecting those that fail security testing.

You might also like