JUNIPER SSG-5-SH Secure Services Gateways

JUNIPER SSG-5-SH Secure Services Gateways

£54.00
sage paypal american_express visa maestro mastercard

Product Description

Refurbished JUNIPER SSG-5-SH Secure Services Gateways

The Juniper Networks® SSG5 and SSG20 Secure Services Gateways are high-performance security platforms for small branch office and standalone businesses that want to stop internal and external attacks, prevent unauthorized access and achieve regulatory compliance. Both the SSG5 and SSG20 deliver 160 Mbps of stateful firewall traffic and 40 Mbps of IPsec VPN traffic.

JUNIPER SSG-5-SH Secure Services Gateways: Product Features

Security: Protection against worms, viruses, trojans, spam, and emerging malware is delivered by proven unified threat management (UTM) security features that are backed by best-in-class partners. To address internal security requirements and facilitate regulatory compliance, the SSG5 and SSG20 both support an advanced set of network protection features such as security zones, virtual routers and VLANs that allow administrators to divide the network into distinct secure domains, each with its own unique security policy. Policies protecting each security zone can include access control rules and inspection by any of the supported UTM security features.

Connectivity and Routing: The SSG5 has seven on-board 10/100 interfaces with optional fixed WAN ports. The SSG20 has five 10/100 interfaces with two I/O expansion slots for additional WAN connectivity. The broad array of I/O options coupled with WAN protocol and encapsulation support in the routing engine make both the SSG5 and the SSG20 a solution that can easily be deployed as a traditional branch office router or as a consolidated security and routing device to reduce CapEx and OpEx. Both the SSG5 and SSG20 support 802.11 a/b/g as a factory configured option supported by a wide array of wireless specific security features. 

Access Control Enforcement: The SSG5 and SSG20 can act as enforcement points in a Juniper Networks Unified Access Control deployment with the simple addition of the IC Series Access Control Appliance. The IC Series functions as a central policy management engine, interacting with the SSG5 or SSG20 to augment or replace the firewall-based access control with a solution that grants/denies access based on more granular criteria that include endpoint state and user identity in order to accommodate the dramatic shifts in attack landscape and user characteristics. 

World Class Support: From simple lab testing to major network implementations, Juniper Networks Professional Services will collaborate with your team to identify goals.

Delivery

Free Next Business Day delivery to Mainland UK address with UPS, DPD, FedEx, TNT, DHL and Royal Mail. Low cost, speedy and secure delivery to European customers. Track orders as soon as they have been dispatched.

Customer Reviews

Write Your Own Review
You're reviewing:JUNIPER SSG-5-SH Secure Services Gateways
Your Rating

Why buy refurbished hardware from My Next Box

My Next Box is a UK-based retailer of certified refurbished IT hardware. We inspire businesses to create innovative and secure circular IT ecosystems when new is not essential. Refurbished products offer better value than new in terms of cost, packaging and RAM capacity. Buy or sell refurbished equipment including servers, routers, switches and IP phones.

Buying high quality refurbished IT Hardware is a sustainable model which helps your business to create a positive Economical, Social and Environmental impact.

Company Accreditations

Listed below are our company accreditations to provide assurances of our services level standards. A complete peace of mind whilst working with us.

Environment agency exemption T11

Being registered with the Environment Agency under a T11 exemption, we are allowed to repair, refurbish, dismantle and recycle various types of electronic waste. We mainly specialise in Networking Routers, Switches, Servers and Storage, with a small volume of Laptops, Desktops and mobile devices. Therefore most of the WEEE generated would be related to this category of E-waste. Our T11 registration site reference number: NC2/060999/2017

Waste Carrier License

As a business that carries EEE waste as part of our business process, we comply with the Environment agency requirement, to be registered as a Waste Carrier Broker. Our Registration no is CBDU92807. You can also verify our registration number at the EA website

Environment Agency waste storage permission

As a business, which repairs and refurbishes IT Hardware for Re-Use, we are registered with the Environment Agency permitting us to store WEEE which has been generated from units, which are not for reuse purposes. All WEEE is then transported to a downstream WEEE processor, who is authorised by the EA to treat WEEE waste.

ICO Certificate

The Information Commissioner’s Office requires organisations and data controllers who process personal information to be registered with the ICO. Since setting up the business in 2009, we have been registered with the ICO and are fully compliant with all DATA protection laws and the upcoming GDPR requirements.

ISO 14001 certified

The ISO14001 sets the standards for Environmental Management Systems. Our business model is all about a positive environmental impact through reuse rather than manufacturing new, therefore creating a circular business model and the ISO 14001 validates that. Not only are we reducing waste through a business model, business processes but we are also creating a sustainable eco-system for our customers for refurbished IT Procurement.

ISO 9001 certified

As a Certified ISO9001 business you can be assured that we operate to a set of audited management standards. We have streamlined business processes which clearly define each business process, from purchasing, to goods in, processing and goods out to name a few. These standards are not just written processes but are embedded within the business and embraced by every employee.

Data Processor Cyber privacy insurance

As an established and respected business, we have the required Public, Professional and Employers Liability Indemnity insurance. Additionally as a data processor, handling IT assets from other businesses we hold the specialist, Data Processor Cyber Privacy Indemnity insurance. Feel free to contact us should you require a copy when doing any business with us.

Can’t Find An Item?

Let us know if there is something you’re looking for. We will try our best to assist you.