{"id":3218,"date":"2020-12-22T21:28:25","date_gmt":"2020-12-22T14:28:25","guid":{"rendered":"https:\/\/cybersec.co.th\/?post_type=product&#038;p=3218"},"modified":"2024-05-06T11:10:33","modified_gmt":"2024-05-06T04:10:33","slug":"palo-alto-networks-pa-820","status":"publish","type":"product","link":"https:\/\/cybersec.co.th\/th\/product\/palo-alto-networks-pa-820\/","title":{"rendered":"Palo Alto Networks PA-820"},"content":{"rendered":"<p>Palo Alto Networks PA-800 Series next-generation firewall appliances, comprised of the PA-820 and PA-850, are designed to secure enterprise branch offices and midsized businesses.<\/p>\n<p>The controlling element of the Palo Alto Networks\u00ae PA-800 Series appliances is PAN-OS\u00ae security operating system, which natively classifies all traffic, inclusive of applications, threats and content, and then ties that traffic to the user, regardless of location or device type. The application, content and user \u2013 in other words, the business elements that run your business \u2013 are then used as the basis of your security policies, resulting in an improved security posture and a reduction in incident response time.<\/p>\n<p>Key Security Features:<\/p>\n<p>Classifies all applications, on all ports, all the time<\/p>\n<p>Identifies the application, regardless of port, encryption (SSL or SSH), or evasive technique employed<br \/>\nUses the application, not the port, as the basis for all of your safe enablement policy decisions: allow, deny, schedule, inspect and apply traffic-shaping<br \/>\nCategorizes unidentified applications for policy control, threat forensics or App-ID\u2122 application identification technology development<br \/>\nEnforces security policies for any user, at any location<\/p>\n<p>Deploys consistent policies to local and remote users running on the Windows\u00ae, Mac\u00ae OS X\u00ae, Linux\u00ae, Android\u2122 or Apple\u00ae iOS platforms<br \/>\nEnables agentless integration with Microsoft\u00ae Active Directory\u00ae and Terminal Services, LDAP, Novell\u00ae eDirectory\u2122 and Citrix\u00ae<br \/>\nEasily integrates your firewall policies with 802.1X wireless, proxies, NAC solutions, and any other source of user identity information<br \/>\nPrevents known and unknown threats<\/p>\n<p>Blocks a range of known threats, including exploits, malware and spyware, across all ports, regardless of common threat-evasion tactics employed<br \/>\nLimits the unauthorized transfer of files and sensitive data, and safely enables non-work-related web surfing<br \/>\nIdentifies unknown malware, analyzes it based on hundreds of malicious behaviors, and then automatically creates and delivers protection<\/p>","protected":false},"excerpt":{"rendered":"<p>Palo Alto Networks PA-800 Series next-generation firewall appliances, comprised of the PA-820 and PA-850, are designed to secure enterprise branch offices and midsized businesses. The controlling element of the Palo Alto Networks\u00ae PA-800 Series appliances is PAN-OS\u00ae security operating system, which natively classifies all traffic, inclusive of applications, threats and content, and then ties that [&hellip;]<\/p>","protected":false},"featured_media":3227,"comment_status":"open","ping_status":"closed","template":"","meta":[],"product_brand":[],"product_cat":[70,48],"product_tag":[],"class_list":{"0":"post-3218","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-firewall","7":"product_cat-security-hacking-tools","9":"first","10":"onbackorder","11":"taxable","12":"shipping-taxable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/cybersec.co.th\/th\/wp-json\/wp\/v2\/product\/3218","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybersec.co.th\/th\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/cybersec.co.th\/th\/wp-json\/wp\/v2\/types\/product"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersec.co.th\/th\/wp-json\/wp\/v2\/comments?post=3218"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersec.co.th\/th\/wp-json\/wp\/v2\/media\/3227"}],"wp:attachment":[{"href":"https:\/\/cybersec.co.th\/th\/wp-json\/wp\/v2\/media?parent=3218"}],"wp:term":[{"taxonomy":"product_brand","embeddable":true,"href":"https:\/\/cybersec.co.th\/th\/wp-json\/wp\/v2\/product_brand?post=3218"},{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/cybersec.co.th\/th\/wp-json\/wp\/v2\/product_cat?post=3218"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/cybersec.co.th\/th\/wp-json\/wp\/v2\/product_tag?post=3218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}