Palo PANdb URL Filtering for PA-3020 - subscription license renewal (3 year

Mfg.Part: PAN-PA-3020-URL4-3YR-HA2-R | CDW Part: 3516207 | UNSPSC: 43233205
Availability: In Stock
Order fulfilled by a CDW partner.
Warranties

Terms and Conditions

These services are considered Third Party Services, and this purchase is subject to CDW’s Third Party Cloud Services Terms and Conditions, unless you have a written agreement with CDW covering your purchase of products and services, in which case this purchase is subject to such other written agreement.

The third-party Service Provider will provide these services directly to you pursuant to the Service Provider’s standard terms and conditions or such other terms as agreed upon directly between you and the Service Provider. The Service Provider, not CDW, will be responsible to you for delivery and performance of these services. Except as otherwise set forth in the Service Provider’s agreement, these services are non-cancellable, and all fees are non-refundable.

Product Details
  • 3020
  • Subscription license renewal (3 years)
  • 1 device in HA pair
  • prepaid
View Full Product Details
Better Together
Palo PANdb URL Filtering for PA-3020 - subscription license renewal (3 year
Quick View
Total Price:

Product Overview

Main Features
  • 3020
  • Subscription license renewal (3 years)
  • 1 device in HA pair
  • prepaid
Fully integrated URL filtering database enables policy control over web browsing activity, complementing the policy-based application visibility and control that the Palo Alto Networks firewalls deliver.

Stand-alone URL filtering solutions are insufficient control mechanisms because they are easily bypassed with external proxies, circumventors and remote desktop access tools. Controlling user activity requires a multi-faceted approach that implements policies to control web activity and the applications that are commonly used to bypass traditional security mechanisms.

Palo Alto Networks' firewalls identify and control more than 800 applications, irrespective of port, protocol or SSL encryption or evasive characteristic. Once identified, the application identity, not the port or protocol, becomes the basis of all security policies, resulting in the restoration of application control. Acting as the perfect complement to policy-based application control is an on-box URL filtering database that provides control o