Dell Security Eases Management of Converged Networks

by April 5, 2016 0 comments

BANGALORE, INDIA: Dell Security has announced the release of SonicOS6.2.5 for Dell SonicWALL SuperMassive, NSA and TZ Series firewalls. This new firmware extends security to Dell switches, wireless access points and firewalls by consolidating the management of the converged network infrastructure. The release also significantly advances capabilities associated with inspecting encrypted traffic, a major threat vector in today’s malware economy, and meets strict certification requirements of the US Department of Defense.

SonicOS 6.2.5 simplifies support for Dell Security partners by providing one version of firmware to handle the majority of Dell SonicWALL products. The new SonicOS also increases connection counts on encrypted HTTPS sessions, enabling stronger encryption support and expanding government certification for high security applications. It simplifies network management for both distributed enterprises and managed service providers by allowing management of the Dell Networking X-Series switches by SonicWALL TZ series firewalls and SonicWALL Global Management System, enabling central management of distributed converged networks. This release also improves performance, increases flexibility and makes systems more secure against today’s more sophisticated attacks.

“Over the last two years, through government initiatives such as Digital India and Make in India, there has been an increasing focus on expanding the digital footprint in India. The digitization process of a country also means that there will be increase in demand for solutions which protect from cyber threats. In an era of growing security threats, it is important for customers to ensure that their network is well protected from internal as well as external attacks without too much complexity,” said Amit Singh, Country Manager, Dell SonicWALL.

With the release of SonicOS 6.2.5, customers can establish a secure platform which is easy to manage and administer as well as optimize security, manage organization’s growth and gain insight into application traffic, bandwidth and threats.

 

 

No Comments so far

Jump into a conversation

No Comments Yet!

You can be the one to start a conversation.

Your data will be safe!Your e-mail address will not be published. Also other data will not be shared with third person.