Top Banner
Check Point (R75) Cisco (ASA 5500) Junipe r (SRX) Palo Alto Networks SonicWALL WatchGuard Common Criteria FIPS 140-2 NSS Labs ICSA FW ICSA IPSec ICSA SSL- TLS ICSA IPS ICSA Antispam VB 100 JITC (IPv6)
4

Competitive Comparison Charts June 2011

Nov 28, 2014

Download

Documents

Pomoga Pommy
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Competitive Comparison Charts June 2011

Check Point (R75)

Cisco(ASA 5500)

Juniper

(SRX)

Palo Alto Network

s

SonicWALL WatchGuard

Common Criteria

FIPS 140-2

NSS Labs

ICSA FW

ICSA IPSec

ICSA SSL-TLS

ICSA IPS

ICSA Antispam

VB 100

JITC (IPv6)

Page 2: Competitive Comparison Charts June 2011

2

2

Check Point (R75)

Cisco(ASA 5500)

Juniper

(SRX)

Palo Alto Network

s

SonicWALL

McAfee(Enterprise

FW)

WatchGuard

Security Content Acceleration

Firewall

VPN

IPS

Antivirus

Antispam

Content Filtering

Virtual Domain

Application Control

SSL Content Inspection

Data Loss Prevention

WAN Optimization

Wireless Controller

Vulnerability Assessment

Endpoint Control

Page 3: Competitive Comparison Charts June 2011

3

Check Point (R75)

Cisco(ASA 5500)

Juniper

(SRX)

Palo Alto Network

s

Websense(Triton/ V-

series)

Blue Coat(ProxyAV)

SonicWALL

Security Content Acceleration

Firewall

VPN

IPS

Antivirus

Antispam

Content Filtering

Virtual Domain

Application Control

SSL Content Inspection

Data Loss Prevention

WAN Optimization

Wireless Controller

Vulnerability Assessment

Endpoint Control

Page 4: Competitive Comparison Charts June 2011

4

4

Check Point (R75)

Cisco(ASA 5500)

Juniper

(SRX)

Palo Alto Network

s

Websense(Triton/ V-

series)

Blue Coat(ProxyAV)

SonicWALL

Security Content Acceleration

Firewall

VPN

IPS

Antivirus

Antispam

Content Filtering

Virtual Domain

Application Control

SSL Content Inspection

Data Loss Prevention

WAN Optimization

Wireless Controller

Vulnerability Assessment

Endpoint Control