Price On Request
Users who have registered businesses can buy products from merchants on the platform that meet their needs. However, all purchases made on the Platform must be for personal use. Users are forbidden from using any of the products they buy through the Platform for business, advertising, resale, or further distribution.
The user will be sent a Tax Invoice ("GST invoice") for the purchase of all such products, which will, among other things, have the following information printed on it:
- The GSTIN submitted by the User in connection with the registered business of the User.
- The User's specified Entity Name for the User's Registered Business
Please be aware that not every product qualifies for a GST Invoice. Only specific items sold by participating sellers and bearing the callout "GST Invoice Available" on the Platform's product detail page will be qualified for GST Invoice.
The following goods and services will not be eligible for GST Invoice:
- if the items come with Value Added Services such as Complete Mobile Protection or Assured Buyback.
- if an exchange offer is made concurrently with the purchase of the goods
Please be aware that the GST invoice must include the user's GSTIN and the name of the business entity that the user has specified. Users should make sure the information they enter is accurate.
Any request for a correction to the GST Invoice will not be entertained by Techjockey.com or the Seller. Techjockey.com and the Seller are not responsible for any failure on the part of the user, including issues related to information the user has provided.
Please be aware that Techjockey.com is not in any way responsible for the GST Invoice or any associated input tax credit. Please choose the address that is listed as the registered place of business according to the GST authority's data in order to efficiently claim an input tax credit. Please be aware that the provisions of the GST Act and rules must be followed in order to claim an input tax credit.
The delivery and billing addresses must match; additionally, the GST authority will not grant input tax credits if the delivery address and GSTIN on the GST invoice are from different states. Please be aware that if the wrong GST details are given when placing an order, the order will be automatically canceled.
Get Free Expert Advice
PA-400 is a modern ML-powered network firewall security offering threat prevention capabilities to midsize businesses, retail locations, and enterprise branch offices. PA-400 or Palo Alto 400 is the world's first NGFW (next-generation firewall) with the Highest Security Effectiveness scores for hun... Read more
PA-400 is a modern ML-powered network firewall security offering threat prevention capabilities to midsize businesses, retail locations, and enterprise branch offices. PA-400 or Palo Alto 400 is the world's first NGFW (next-generation firewall) with the Highest Security Effectiveness scores for hundred percent threat evasion. The device provides unified threat management, extended visibility, and security to the Internet of Things (IoT) and unmanaged IoT devices. In addition, PA-400 features a fanless, silent design and promises reliable network firewall security.
Pride details of the PA-400 network firewall are available on request at techjockey.com
The price may vary based on customization, additional features required, the number of users, and the deployment type. For subscription-related details and offers on premium packages, please request a call back from our product experts.
One product can change your life
We make it happen! Get your hands on the best solution based on your needs.
ML-Powered Next-Generation Firewall
PA-400 offers NGFW (next-generation firewall) for advanced threat protection to IoT & unmanaged IoT devices.
Enables SD-WAN functionality
The device PA-400 adopts SD-WAN on all firewalls for an exceptional user experience & minimizing jitters & packet loss.
Centralized Management & Visibility
PA-400 scales log collection & streamlines configuration sharing using device groups.
Prevents malicious activity concealed in encrypted
PA-400 applies policies to TLS/SSL encrypted outbound/inbound traffic for preventing all malicious activities
Identifies & Categorizes All Applications
The NGFW identifies the applications traversing a network for thwarting the exfiltration attempts.
Enforces security for users at any location
The network firewall enables forensics, policies & visibility based on groups/users for device security at all locations.
Q. What is the use of single-pass architecture in the PA-400 network??
Q. Is PA-400 suitable for medium-scale enterprises?
Q. Can I use PA-400 on IoT?
Q. What is PA-400?
Q. Does PA-400 monitor malicious activities also?