Cisco Systems Cisco FirePOWER 8 Port 1G Copper FTW Net
Volume Discounts
Contact us and save even more if you meet these Big Deal qualifications.Purchase a minimum of $10,000 of Cisco products to qualify. Reach out to a sales rep!
Note: We Are Unable to Sell this Product to Dealers. Provantage is authorized to only sell this product to a final purchaser or licensee that has acquired it for their own use and not for resale, remarketing or distribution.
Cisco Firepower Next-Generation IPS (NGIPS) threat appliances provide network visibility, security intelligence, automation and advanced threat protection. It uses industry-leading intrusion prevention capabilities and multiple techniques to detect even the most sophisticated network attacks and protect you against them. Cisco Firepower NGIPS threat appliances all offer the ability to operate in-line via Fail-To-Wire/Bypass network modules.
Cisco Firepower NGIPS continuously discovers information about your network environment, including data about operating systems, mobile devices, files, applications and users. It then uses this information to build network maps and host profiles. This gives you the contextual information you need to make better decisions about intrusion events. And this information is also used as input to better enable the automation of key threat protection features.
Cisco's TALOS Security Intelligence and Research Group collects and correlates threats in real time using the largest threat detection network in the world. Their efforts result in vulnerability- focused IPS rules and embedded IP-, URL-, and DNS-based security intelligence for Firepower NGIPS.Security automation correlates intrusion events with your network's vulnerabilities so you can focus on the threats that matter most. It also analyzes your network's weaknesses and recommends the appropriate security policies to put in place.
Cisco Firepower NGIPS threat appliances provide industry leading threat effectiveness against both known and unknown threats. Features include:
IPS rules that identify and block attack traffic that target vulnerabilities in your network
Tightly integrated defense against advanced malware incorporating advanced analysis of network and endpoint activity
Sandboxing technology that uses hundreds of behavioral indicators to identify zero-day and evasive attacks