Access "SonicWALL TZ 180W firewall product review"
This article is part of the October 2007 issue of Tips from the 2007 Security 7 Awards
FIREWALL SonicWALL TZ 180W REVIEWED BY JOEL SNYDER SonicWALL Price: $700 for 10-user version with standard O/S SonicWALL has been a major player in the SME firewall market for as long as there has been a market, helping to define what SME firewalls should look like, cost and do. The SonicWALL TZ 180W UTM continues SonicWALL's tradition of products designed and sized for the small business. Ease of Use A- Small-office firewalls are often difficult to use, as developers jam more and more features into poorly designed user interfaces. The TZ 180W, from opening the box to final deployment, has a sophisticated and refined feel. Although we ran into a bug in the initial deployment wizard and some misdirected online help, every other part of the system was easy to use. The TZ 180W with SonicWALL's SonicOS Standard is stripped down from an enterprise firewall, which means that some features, such as NAT, come as "one size fits all." However, SonicWALL has chosen an excellent subset of features--more than most network managers will need--for the small office ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Achieving Access Control with Symark PowerBroker 5.0
In this product review, discover everything you need to know about Symark PowerBroker 5.0, such as policy control, logging and reporting capabilities, configuration and management.
-
Guardium SQL Guard 6.0 product review
Guardium SQL Guard 6.0 is evaluated on its ability to monitor access to SQL databases. SQL Guard ensures a system of checks and balances between the security and database engineering teams.
-
Knoppix-NSM removes complexity of Snort-based network security monitoring
by Russ McRee, Contributor
Open source Knoppix-NSM is a complete network security monitoring system on a single CD.
-
Device Management: Pointsec Protector software review
Pointsec Protector manages unsecured ports and endpoint devices while transparently delivering encryption, filtering content, enforcing policies and maintaining an audit trail, even when mobile devices are disconnected from the network.
-
BeyondTrust Privilege Manager 3.0 product review
BeyondTrust's Privilege Manager 3.0 addresses elevated user privileges through a Group Policy extension that allows organizations to control permissions for selected processes and applications.
-
Achieving Access Control with Symark PowerBroker 5.0
-
-
SonicWALL TZ 180W firewall product review
SonicWALL TZ 180W is an effective firewall for small- and medium-size businesses with a subset of features that will appeal to network managers.
-
Proofpoint On Demand Product Review
In this product review, learn about Proofpoint On Demand antivirus and antispam features.
-
Security 7 Award winners successfully integrate security and business
The 2007 Information Security magazine Security 7 Award winners demonstrate how their strategies for integrating their security programs into the overall business.
-
Log management reins in security and network device data
Learn how to manage log data from security and network devices in order to manage security events in real time.
-
Automated configuration management tools clean out redundant rules
Change management becomes a tough challenge when implementing numerous firewalls.
-
SonicWALL TZ 180W firewall product review
-
Columns
-
Learn to balancing security and usability
Security measures such as constant password changes, are becoming intrusive, and the return is questionable.
-
Interview: CISO explains enterprise's access control policies
Access control and authentication isn't as simple as setting up user IDs and passwords.
-
Vendor compliance management: Are health care software vendors HIPAA compliant?
Software used in health care is rife with vulnerabilities. It's time vendors shape up.
- Viewpoint: Hard drive encryption growing
-
Redefining free security software
Popular open source security products such as Nessus, Snort and Clam AV are being commercialized, redefining the notion of free software.
-
Learn to balancing security and usability
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Security Management Strategies for the CIO