Stonesoft 5205
Stonesoft

Stonesoft 5205

High performance, AET-ready security for large networks

The Stonesoft 5205 appliance is a versatile and modular Security Engine (NGN)-powered solution designed to meet the performance and scalability requirements of high-end data centers and large network central sites. It can be used in the Firewall/VPN role (Layer 3) for secure routing, NAT, and IPsec VPN gateway purposes. It can be used in the IPS role (Layer 2) in an IDS deployment or an inline IPS deployment, or in the Layer 2 Firewall role. All of these roles are available with a single unified software image and are adaptable by simple configuration change.

In the Firewall/VPN role, the Stonesoft 5205 provides high performance with unique clustering capabilities for up to 16 nodes. This provides very high IPsec VPN speeds, as well as high-performance content and application inspection.

In the IPS and Layer 2 Firewall roles, the Security Engine becomes transparent to surrounding network devices. The inline IPS and Layer 2 firewall combine flexible deployment, AET-ready network security, and application control into one dedicated appliance.

The adaptable platform that delivers security as a service

Built on the Stonesoft Security Engine (NGN) platform, the Stonesoft 5205 can transform as your organizational needs change. The Security Engine is a unique unified design – the next generation platform for network security – that can take on different security roles, with the flexibility of security-as-a-service. You can make rapid deployment changes remotely and automatically via license, helping to cut OPEX and eliminate unnecessary future CAPEX rounds.

The Stonesoft 5205 is adminstered via the class-leading Stonesoft Management Center. SMC gives you the ability to automate workflows, easily define policies across your entire infrastructure, swiftly access visualizations, and offers unpresedented situational awareness. The console has been designed to save administrators time and effort. SMC helps to further cut OPEX while enabling you to implement the most suitable network security to enable maximum productivity for your business.

Comparison datasheets: