Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Mobile & Wireless

SonicWALL Expands Wireless Access Point Product Line

SonicWALL, Inc. today announced the addition of two new secure wireless access points to its SonicPoint™ Series. These new devices are designed to provide clean wireless connections through integration with a collection of existing SonicWALL products: Gateway Anti-Virus, Intrusion Prevention, Anti-Spyware and Content Filtering.

SonicWALL, Inc. today announced the addition of two new secure wireless access points to its SonicPoint™ Series. These new devices are designed to provide clean wireless connections through integration with a collection of existing SonicWALL products: Gateway Anti-Virus, Intrusion Prevention, Anti-Spyware and Content Filtering. They support wireless encryption standards, wireless intrusion prevention services and rogue access point detection.SonicPoint-Ni

From a technical perspective, the new devices – the SonicPoint-Ni and SonicPoint-Ne – are 802.11n compliant, dual-band, single radio wireless secure access points that integrate seamlessly into the existing SonicWALL TZ, Network Security Appliance (NSA) and E-Class NSA product lines. They extend SonicWALL’s firewall capabilities to distributed wireless networks, so customers can manage both their wireless and wired network from one firewall device.

The firewall enables organizations to control and prioritize wireless access to business applications while de-prioritizing other bandwidth-hogging applications and sites such as gaming applications or video streaming Web sites. According to SonicWALL, IT managers are now able to allocate rights on a granular basis to those specific users and groups who need to access key sets of applications, while restricting access to other users and groups where appropriate.

Retailers with concerns about the Payment Card Initiative (PCI) can deploy SonicWALL wireless networks with enhanced security and scan either the 2.4 or 5.0 MHz spectrums to satisfy PCI security requirements.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...

Mobile & Wireless

Samsung smartphone users warned about CVE-2023-21492, an ASLR bypass vulnerability exploited in the wild, likely by a spyware vendor.