throbber
Case 5:17-cv-04467-BLF Document 347-19 Filed 01/21/21 Page 1 of 4
`Case 5:17-cv-04467-BLF Document 347-19 Filed 01/21/21 Page 1 of 4
`
`
`
`EXHIBIT 17
`
`EXHIBIT 17
`
`
`
`
`
`

`

`Case 5:17-cv-04467-BLF Document 347-19 Filed 01/21/21 Page 2 of 4
`
`exhibitsticker.com
`
`Exhibit #
`
`Striegel 7
`
`11/03/20 - CS
`
`

`

`Case 5:17-cv-04467-BLF Document 347-19 Filed 01/21/21 Page 3 of 4
`Case 5:17-cv-04467-BLF Document 347-19 Filed 01/21/21 Page 3 of 4
`
`Features and benefits
`
`Inspection across any port and
`protocol for either inbound or outbound
`traffic provides ultimate coverage
`against today's threats even those using
`non—standard ports,
`
`Application intelligence and control
`provides granular control and real—time
`visualization of applications to guarantee
`bandwidth priontization and ensure
`maximum network security and
`productivity.
`
`Real-time gateway anti-virus scanning
`delivers intelligent file—based protection
`through a high— performance engine
`that scans for file—based Internet threats
`in real—time.
`
`Dynamically updated signature
`database contains over 2,800
`application and thousands of malware
`signatures capable of detecting millions
`of pieces of malware.
`
`Dynamic spyware protection blocks the
`installation of malicious spyware and
`disrupts background communications
`from existing spyware programs that
`transmit confidential data.
`
`Powerful intrusion prevention protects
`against a comprehensive array of
`network—based threats by scanning
`packet payloads for software
`vulnerabilities such as buffer overflows.
`
`peer—to—peer and instant messaging
`exploits. backdoor attacks, and other
`malware.
`
`Ultimate scalability and performance
`leverages the unique Dell SonicWALL
`Reassembly—Free Deep Packet
`Inspection engine, which scans
`unlimited file sizes, and hundreds of
`thousands of concurrent downloads in
`real time.
`
`Powerful signatures developed by the
`SonicAlert teams are intelligent and
`flexible enough to be able to detect new
`variants of the already known malware,
`in many cases providing effective
`zero—day protection.
`
`Inter-zone scanning provides an
`additional layer of protection against
`malicious threats by allowing
`administrators to enforce intrusion
`
`prevention and anti—virus scanning not
`only between each network zone and
`the Internet, but also between internal
`network zones.
`
`Comprehensive logging and
`application traffic analytics of all
`intrusion attempts with the ability to filter
`logs based on priority level enables
`administrators to highlight high priority
`attacks, with granular reports based on
`attack source. destination and type of
`attack available through Dell SonicWALL
`Analyzer, Dell SonicWALL Scrutinizer or
`Dell SonicWALL Global Management
`System (GMS‘El.
`
`
`
`All [ll-ES.
`applications
`and traffic
`
`
`
`Dell
`SonIcWJlLL
`Signature
`database
`
`O
`
`I
`
`Dell SthAlcrt learn
`and lhird' party sources
`SonIcPoint-Ne
`Dual Band
`
`
`Scannmg
`I.
`scan rung
`|
`and blocking
`
`
`and blocking E
`or pnorutizmg
`ornnorrhzing
`u o 09
`
`
`
`iii
`
`Distributed Wireless LAN
`
` and blocking
`0r priOflllZlng
`
`
`
`
`
`
`_.
`
`It: Inter-zone ill
`scanning
`
`Dell SonicWALL Deep Packet
`Inspection Architecture
`0 High—performance engine scans for
`viruses, spyware. worms, Trojans and
`application exploits
`
`e Continually updated database
`containing thousands of threat
`signatures
`
`0 Protection is extended to both wired
`and wireless networks
`
`0 Inter—zone scanning delivers
`protection not only between each
`network zone and the Internet, but also
`between internal network zones
`
`6 Protection for business
`communications including web
`browsing, email use and file transfers
`
`Beau" L
`
`u Fl
`5" Ji't'.‘
`
`FINJAN—SW 008058
`
`

`

`Case 5:17-cv-04467-BLF Document 347-19 Filed 01/21/21 Page 4 of 4
`Case 5:17-cv-04467-BLF Document 347-19 Filed 01/21/21 Page 4 of 4
`
`Feature list
`
`File scanning capabilities
`- Common protocols such as SMTP,
`POP3, IMAP, H'I'I'P, I-‘I'P, NetBIOS and
`many others
`- All protocols across every port.
`including SSL traffic with DPI SSL
`- Dozens of streamwbased protocols
`
`- Instant messaging and peer—tonpeer
`file transfers
`
`Intrusion prevention
`- Protection against malware, software
`vulnerabilities such as buffer overflows,
`as well as peer‘to-peer and instant
`messenger applications, backdoor
`exploits. and other malicious
`
`Application control
`- Visualization, classification and policy
`enforcement to help administrators
`control and manage both business and
`non~business related applications
`
`Scalability
`- Able to scan an unlimited number of
`
`concurrent downloads of any file size
`
`Signature database
`0 Dynamically-updated database
`containing thousands of attack,
`vulnerability and high threat virus
`signatures
`
`Logging and application
`traffic analytics
`0 Advanced next—generation syslog
`reporting for real—time logging and
`alerting
`
`o NetflovaIPFIX with extensions logging
`for additional network traffic detail and
`visualization
`
`0 Application Traffic Analytics through
`Dell SonicWALL Analyzer, Dell
`SonicWALL Scrutinizer or Dell
`
`SonicWALL Global Management
`System
`
`Supported compression formats
`- ZIP, Deflate and GZIP
`
`For more information on Dell
`SonicWALL’s suite of valuewadded
`
`security services including Gateway
`Anti—Virus, Anti- Spyware, Intrusion
`Prevention, and Application Intelligence
`and Control Service, Comprehensive
`Anti-Spam Service, Enforced Client
`Anti-Virus and Anti-Spyware and
`Content Filtering Service, please
`visit our web site at
`
`http:flwww.sonicwall.com.
`
`
`
`Dell SonicWALL Ga teway Anti-Virus. Anti-Spywa re.
`Intrusion Prevention, and Application Intelligence
`and Control Service
`
`NSA E8510 [l‘year]
`Ol-SSC-9255
`NSA [[8500 flvycarl
`OJvSSC-EEMD
`NSA [£500 [1-year]
`Dl-SSC-6131
`NBA E5500 [1-year]
`01'55C—5152
`NSA 45m] [1—year]
`Ol-SSC-GISS
`NSA 3500 llAyearl
`Ol-SSC-6134
`NSA 2400l1vyear‘i
`UlrSSC-fil35
`NSA 250 Series [l‘yeall
`OIASSC-flSfl)
`NSA 2‘20 Series llvycarl
`UleSCvtlfil?
`12 215 series [vacar]
`Ol-SSC-475?
`TZ 205 Series 11-year!
`DJVSSCHUQQ
`12105 Series {1-year}
`GIASSCHIB’M
`
`Multi-yearsubscription
`Services are available.
`
`Io access SKUs for the complete line of Dell SonicWAl I
`network security appliances. please visit
`www.sonicwall.com
`
`
`CSIdas
`DBIT‘IFIEIJ um
`
`I'J‘A'l} ["11 I30 LIEiI
`
`Software
`
`FINJAN—SW 008059
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket