1 Panda GateDefender Performa Your First Line of Defense Product Presentation Name 2008.

Slides:



Advertisements
Similar presentations
A l a d d i n. c o m eSafe 6 FR2 Product Overview.
Advertisements

TrustPort Net Gateway Web traffic protection. Keep It Secure Contents Latest security threats spam and malware Advantages of entry point.
Microsoft Security Solutions A Great New Way of Making $$$ !!! Jimmy Tan Platform Strategy Manager Microsoft Singapore.
Bucharest, July 31, 2012 | Bitdefender 2012 Cloud Security for Endpoints Customer Presentation.
Barracuda Security Service. Barracuda Networks Introduction to Barracuda Security Service 2 Easy to Deploy Cloud-based security Nothing.
Benefits of CA Technology & HVB Bank Romania Study Case Bucharest, May 31, 2005.
AVG Internet Security 7.5 Product presentation.
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
Threat Overview: The Italian Job / HTML_IFRAME.CU June 18, 2007.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
© 2009 WatchGuard Technologies WatchGuard XCS Extensible Content Security Superior Security with Lowest TCO.
Lisa Farmer, Cedo Vicente, Eric Ahlm
MSIT 458: Information Security & Assurance By Curtis Pethley.
1 Trend Micro InterScan Web Security Suite ™ 2.5 戴 燊 Samson Tai 趨勢科技 台灣區技術行銷部 技術顧問.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
LittleOrange Internet Security an Endpoint Security Appliance.
What’s New in WatchGuard XCS 10.0 Update 3 WatchGuard Training.
Course 201 – Administration, Content Inspection and SSL VPN
Version 2.0 for Office 365. Day 1 Administering Office 365 Day 2 Administering Exchange Online Office 365 Overview & InfrastructureLync Online Administration.
Kaspersky Lab: The Best of Both Worlds Alexey Denisyuk, pre-sales engineer Kaspersky Lab Eastern Europe 5 th April 2012 / 2 nd InfoCom Security Conference.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
Barracuda Spam & Virus Firewall. Introduction to the Barracuda Spam & Virus Firewall Complete server protection –Spam Blocking (95+ percent) Extremely.
Belnet Antispam Pro A practical example Belnet – Aris Adamantiadis BNC – 24 November 2011.
The World's Most Secured Browsing Solution COCKPIT4i is a radically new, powerful solution that protects against the security risks posed by exposure to.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Forefront Security Exchange. Problem Meddelande system och sammarbetsprodukter är underbarar mål för elak kod och “distrubition” av äkta dynga… Viruses.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Barracuda Networks Confidential 1 Barracuda Web Filter Overview 1 Barracuda Networks Confidential11 Barracuda Web Filter Overview.
TrustPort Net Gateway Web traffic protection. Keep It Secure Contents Latest security threats spam and malware Advantages of entry point.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
InterScan Gateway Security Appliance 1.0 Filip Demianiuk Sales Engineer Eastern Europe
ProtectionProfiles. 2 Fortinet Technologies Protection Profiles Protection profiles control t the type of traffic protected t HTTP t FTP t IMAP t POP3.
Securing Microsoft® Exchange Server 2010
Barracuda Web Filter Overview. Introduction to the Barracuda Web Filter Integrated content filtering and Web security –Regulate leisure browsing Adult,
Module 6 Planning and Deploying Messaging Security.
Norman Protection Powerful and flexible Protection Gateway.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
Pre-Release Information Aug 17, 2009 Trend Micro Web Gateway Security InterScan Web Security Virtual Appliance v5 Advanced Reporting and Management v1.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
ANTIVIRUS SOFTWARE.  Antivirus software is the most widespread mechanism for defending individual hosts against threats associated with malicious software,
Sophos Live Protection. Agenda 1.Before and After Scenarios 2.Minimum Required Capabilities 3.How we do it 4.How we do it better.
Hands-On Microsoft Windows Server Implementing Microsoft Internet Information Services Microsoft Internet Information Services (IIS) –Software included.
Module 6: Integrating ISA Server 2004 and Microsoft Exchange Server.
Copyright 2009 Trend Micro Inc. Beyond AV security, now with DLP and web protection. Trend Micro PortalProtect SharePoint Security.
Module 7: Advanced Application and Web Filtering.
“SaaS secure web and gateways frequently provide efficiency and cost advantages, and a growing number of offerings are delivering an improved.
© 2009 WatchGuard Technologies WatchGuard ReputationAuthority Rejecting Unwanted & Web Traffic at the Perimeter.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco Spam & Virus Blocker Wilson Prokosch WW Channel GTM- Sr. BDM.
Implementing Microsoft Exchange Online with Microsoft Office 365
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
Role Of Network IDS in Network Perimeter Defense.
Kaspersky Small Office Security INTRODUCING New for 2014!
Introducing Kaspersky Anti-Virus 6.0 for Windows Workstations Introducing Kaspersky ® Anti-Virus 6.0 for Windows Workstations.
Windows Vista Configuration MCTS : Network Security.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
Web security | data security | security © 2010 Websense, Inc. All rights reserved. Strategy for Defense Against Web-based Advanced Persistent Threats.
Telnet Media. Telnet Media Ltd Surfing the Web Secure Content Management Products Reasons to implement Agenda.
Advanced Endpoint Security Data Connectors-Charlotte January 2016
BUILD SECURE PRODUCTS AND SERVICES
Barracuda Web Filtering Service
Configuring Windows Firewall with Advanced Security
Check Point Connectra NGX R60
Cloud Security for Endpoints
Introduction to Symantec Security Service
Using Software Restriction Policies
Presentation transcript:

1 Panda GateDefender Performa Your First Line of Defense Product Presentation Name 2008

2 Security Concerns What is Panda GateDefender Performa? How Does it Work? Competitive Analysis Frequently Asked Questions Panda GateDefender Performa

3 Security Concerns Panda GateDefender Performa

4 Content Threats Affecting Organizations Malware Information Destruction Infection of partners, clients… Time necessary to recover systems Potentially risky Contents Dangerous contents inside the network Critical information Leak Not job related documents download Spam Resource saturation s resend by users or zombies Time used to eliminate spam Non relevant web contents Waste of shared network resources Illegal or offensive contents resend Time to browse through not job related pages P2P/IM Applications Abusive use of network resources Piracy downloads / Illegal Chats Time used for chatting, downloading…

5 What is Panda GateDefender Performa? Panda GateDefender Performa

6 Panda GateDefender Performa is a high performance and complete SCM appliance that proactively protects the corporate network, against all content based threats, integrating seamlessly in your network architecture. What is Panda GateDefender Performa? SCM: Secure Content Management EFFICIENCY

7 Benefits  Avoids security complexity  Increases users’ productivity  Reduces security operating costs  Contributes to the organization regulatory compliance  Enables risk management  Ensures business continuity

8 How Does it Work? Panda GateDefender Performa

99 Internet How Does it Work? HTTP, FTP SMTP, IMAP4, POP3 NNTP Malware: Suspect files: Potential Risks: Spam: IM/P2P: Unwanted web Content: Disinfect or Delete Quarantine, Clean and Restore Delete or Quarantine Block

10  Proactive integrated technology. Heuristic Engine, Collective Intelligence & Quarantine  Main Internet protocols scanned. HTTP, SMTP, POP3, FTP, IMAP4, NNTP  Scans inbound and outbound traffic  Combines proactive and reactive scan for total efficiency  Updates malware signatures every hour  Updates spam fingerprints every minute  Unattended Protection Features

11  Separated quarantine for Malware, Spam & Content Filter  Integration with LDAP and Active Directory  User and group-based security profiles  Centralized Configuration  Real-time Centralized Graphic Monitoring  High Performance and Scalability  Plug in and Forget Functionalities

12 Models Complete solution Anti-Malware Anti-Malware Protection Content Filter Protection Web Filter (URL) Web Filter Protection IM/P2P Application Blocking Anti-Spam Anti-Spam Protection Modules includedProtections included TOTAL PROTECTION

13 Competitive Analysis Panda GateDefender Performa

14 Competitive Analysis Identify the CompetitorsMake it Simple Real or direct Competitors McAfee (Secure Internet Gateway) Trend Micro (IGSA) CP Secure (Content Security Gateway) We offer more functionalities We have higher Performance We offer better quality of service Indirect Competitors Barracuda IronPort Symantec Trend Micro (IWSA, IMSA) McAfee (Secure web/messaging GS) Our product is more versatile We scan all kind of traffic and threats False Competitors Fortinet IBM-ISS We offer a robust and optimized solution We also have a UTM for small business

15 Competitive Analysis

16 Competitive Analysis Competitors comparative Panda GateDefender Performa McAfee Secure Internet Gateway Trend Micro InterScan Gateway Security Appliance User based Security profiles LDAP integration P2P/IM Blocking Malware quarantine Content Filter Content Filter quarantine Automatic new malware remediation HTTP max. ThroughputUp to 510 MbpsUp to 200 Mbps Not published SMTP max. ThroughputUp to 220 Messages / secUp to 112 Messages / sec Not published Less performance No prevention against new malware No user profiles for different Security policies No Content Filter No IM/P2P Blocking No malware quarantine No Content Filter No IM/P2P Blocking No malware quarantine No directory services integration

17 Competitive Analysis

18 Frequently Asked Questions Panda GateDefender Performa

19 Frequently Asked Questions How long does it take to install? Panda GateDefender Performa takes less than 20 minutes to install and does not require traffic to be redirected or other network components to be reconfigured. The configuration can be done off-line and then be connected to the network. In addition it does not need maintenance after install With GateDefender Performa installed, can I get rid of workstation protection? It’s better to stop malware threats at the perimeter and dedicate server and workstation resources to productive purposes. But there are other indirect ways to infect the network like through CD/DVD, pendrives, roaming laptops, guest users, etc. A perimeter protection optimizes the internal protections efficiency as they don’t have to dedicate resources to cleaning malware infections, but it’s not a replacement. How can unknown malware be detected? The Genetic Heuristic Engine analyzes over 200 traces of evidence from files going through the appliance. This code is checked against a database of traits from different malware families in order to detect new variants that are not detected by antivirus signatures.

20

21