Cisco 5555-X Next-Generation Firewall Services, Intrusion Prevention - subs

Mfg. Part: ASA5555-IP1Y | CDW Part: 3351135 | UNSPSC: 43233205
Availability: 7-9 days Orders placed today will ship within 7-9 days
$3,351.59 Advertised Price
Lease Option ($98.87/month)
Note: Leasing is available to organizations only. Leasing is not available to individuals.
Product Details
  • Subscription license (1 year)
  • 1 appliance
View Full Product Details
Made For Each Other
Quick View
Total Price:

Product Overview

Main Features
  • Subscription license (1 year)
  • 1 appliance
They blend a proven stateful inspection firewall with next-generation firewall capabilities and network-based security controls for end-to-end network intelligence and streamlined security operations. Corporate networks are encountering the highest levels of change in history. Users require anywhere, anytime access to the network from a variety of company-owned and personal mobile devices. In addition, applications have evolved to be highly dynamic and multifaceted, blurring the line between business applications and personal ones that may increase the company's exposure to Internet-based threats. As a result, organizations must take a new approach to that unifies the network's streamlined security operations without abandoning time-tested methods. Cisco ASA Next-Generation Firewall Services enable organizations to rapidly adapt to dynamic business needs while maintaining the highest levels of security.

Cisco Intrusion Prevention System (IPS) solutions accurately identify, classify, and stop malicious traffic, including worms, spyware, adware, network viruses, and application abuse, before they affect business continuity. Cisco IPS solutions defeat threats from multiple vectors, including network, server, and desktop endpoints. The solutions extend across Cisco platforms, from purpose-built appliances and integrated firewall and IPS devices to services modules for routers and switches. A Cisco IPS solution protects the network from policy violations, vulnerability exploitations, and anomalous activity through detailed inspection of traffic at Layers 2 through 7-across your network.

^ Back to Top