Trending Products
Recently Viewed
Apple 240 W USB-C cable 24 pin USB-C to 24 pin USB-C (2m)
Apple 240 W USB-C cable 24 pin USB-C to 24 pin USB-C (2m)
This 2-meter charge cable is made with a woven design – with USB-C connectors on both ends – and is ideal for charging, syncing, and transferring data between USB-C devices. It supports charging of up to 240 watts and transfers data at USB 2 rates. Pair the USB-C charge cable with a compatible USB-C power adapter to conveniently charge your devices from a wall outlet and take advantage of fast-charging capabilities. USB-C power adapters sold separately.
Your Recently Viewed Products
YubiKey 5 Nano
World Wide Delivery Service available for this product
[email protected]
Tip: Purchase a spare YubiKey in case of loss.
SG 105 rev.3 Security Appliance (EU/UK/US power cord)
Sophos SG Series Desktop Appliances: SG 105, SG 105w, SG 115, SG 115w
These desktop firewall appliances offer an excellent price-to-performance ratio making them ideal for budget-conscious small businesses or branch offices.
They are available with or without integrated 802.11ac wireless LAN, so you can even have an all-in-one network security and hotspot solution without the need for additional hardware. Of course, you can also add external access points. With Intel multi-core technology designed for best performance and efficiency in a small form factor, these models come equipped with 4 GbE copper ports built-in and 1 shared SFP interface, e.g. for use with our optional DSL modem or an SFP transceiver for fiber connectivity.
An optional second power supply provides an unmatched redundancy option in this product segment. Select the software modules of your choice, or choose TotalProtect Plus for the full set of security features plus appliance.
XG 85 rev.3 Security Appliance (EU/UK/US power cord)
Sophos XG Firewall provides comprehensive next-generation firewall protection that’s easy to setup and manage, blocking unknown threats, automatically responding to security incidents by isolating compromised systems and exposing hidden user, application, and threat risks on the network to prevent potential issues from becoming real problems.