551

Check Point Safe@Office 500 UTM - security appliance

Mfg. Part: CPSB-500G-5-US | CDW Part: 1090683 | UNSPSC: 43222501
Request PricingCall
 

This item was discontinued on August 8, 2017.

Sales Assistance

800.972.3922 Mon-Fri 8am-6pm ET

Answer within 24 hours.



Close

Have leasing questions? Let us know how can we help.

Note: Leasing is available to businesses only. Leasing is not available to individuals.
800.972.3922
Mon-Fri 7am-7:30pm CT
Check Warehouse Availability ▼
 Close
Warehouse LocationAvailableQuantity Incoming
Inventory quantities are delayed by 15 minutes.
  • Security appliance
  • 5 users
  • 10Mb LAN
  • 100Mb LAN
View More
Product Overview
Main Features
  • Security appliance
  • 5 users
  • 10Mb LAN
  • 100Mb LAN
Designed for the small business, Check Point Safe@Office 500 Unified Threat Management appliances deliver proven Internet security. A single Safe@Office appliance can protect a network of up to 100 users from a wide array of Internet threats, providing a solid line of defense against threats ranging from hacking attempts and bot-net attacks to phishing and ActiveX-based script viruses. In addition, by using Safe@Office VPN to access your network remotely and securely, you can increase productivity and ensure business continuity without compromising network security. The Safe@Office appliance incorporates the same patented Check Point security technology that is deployed by 97% of the Fortune 500. Simply take the Safe@Office appliance out of the box, plug it in, and secure your network in minutes.

By integrating proven Check Point Stateful Inspection firewall technology with a powerful and customizable gateway antivirus, as well as a full-fledged, flexible network router, Safe@Office Unified Threat Management solutions provide complete enterprise-level protection to your network, eliminating the need for multiple security solutions for various threats. Check Point Application Intelligence technology allows the Safe@Office appliance to block denial of service (Dos) attacks, detect protocol anomalies, limit application ability to carry malicious data and control application-layer operations. These mechanisms aid proper usage of Internet resources, such as instant messaging, Peer-to-Peer (P2P) file sharing and File Transfer Protocol (FTP), and allow you to block questionable traffic and ensure that your bandwidth is used in the most efficient and secure way possible.

 
Adding to Cart...
11/22/2017 10:49:04 AM
^ Back to Top

Maximum 300 characters
An account manager will email you within one business day to confirm your request.

Your Quote has been submitted

What Happens Next? A confirmation email is on its way. Within one business day, you will be contacted by an Account Manager to finalize your quote.

Error!

Something went wrong.

Please try again later.