Download presentation
Presentation is loading. Please wait.
Published byKelley Barton Modified over 9 years ago
1
1 Panda GateDefender Performa Your First Line of Defense Product Presentation Name 2008
2
2 Security Concerns What is Panda GateDefender Performa? How Does it Work? Competitive Analysis Frequently Asked Questions Panda GateDefender Performa
3
3 Security Concerns Panda GateDefender Performa
4
4 Content Threats Affecting Organizations Malware Information Destruction Infection of partners, clients… Time necessary to recover systems Potentially risky Contents Dangerous contents inside the network Critical information Leak Not job related documents download Spam Resource saturation e-mails resend by users or zombies Time used to eliminate spam Non relevant web contents Waste of shared network resources Illegal or offensive contents resend Time to browse through not job related pages P2P/IM Applications Abusive use of network resources Piracy downloads / Illegal Chats Time used for chatting, downloading…
5
5 What is Panda GateDefender Performa? Panda GateDefender Performa
6
6 Panda GateDefender Performa is a high performance and complete SCM appliance that proactively protects the corporate network, against all content based threats, integrating seamlessly in your network architecture. What is Panda GateDefender Performa? SCM: Secure Content Management EFFICIENCY
7
7 Benefits Avoids security complexity Increases users’ productivity Reduces security operating costs Contributes to the organization regulatory compliance Enables risk management Ensures business continuity
8
8 How Does it Work? Panda GateDefender Performa
9
99 Internet How Does it Work? HTTP, FTP SMTP, IMAP4, POP3 NNTP Malware: Suspect files: Potential Risks: Spam: IM/P2P: Unwanted web Content: Disinfect or Delete Quarantine, Clean and Restore Delete or Quarantine Block www.xxx.com
10
10 Proactive integrated technology. Heuristic Engine, Collective Intelligence & Quarantine Main Internet protocols scanned. HTTP, SMTP, POP3, FTP, IMAP4, NNTP Scans inbound and outbound traffic Combines proactive and reactive scan for total efficiency Updates malware signatures every hour Updates spam fingerprints every minute Unattended Protection Features
11
11 Separated quarantine for Malware, Spam & Content Filter Integration with LDAP and Active Directory User and group-based security profiles Centralized Configuration Real-time Centralized Graphic Monitoring High Performance and Scalability Plug in and Forget Functionalities
12
12 Models Complete solution Anti-Malware Anti-Malware Protection Content Filter Protection Web Filter (URL) Web Filter Protection IM/P2P Application Blocking Anti-Spam Anti-Spam Protection Modules includedProtections included TOTAL PROTECTION
13
13 Competitive Analysis Panda GateDefender Performa
14
14 Competitive Analysis Identify the CompetitorsMake it Simple Real or direct Competitors McAfee (Secure Internet Gateway) Trend Micro (IGSA) CP Secure (Content Security Gateway) We offer more functionalities We have higher Performance We offer better quality of service Indirect Competitors Barracuda IronPort Symantec Trend Micro (IWSA, IMSA) McAfee (Secure web/messaging GS) Our product is more versatile We scan all kind of traffic and threats False Competitors Fortinet IBM-ISS We offer a robust and optimized solution We also have a UTM for small business
15
15 Competitive Analysis
16
16 Competitive Analysis Competitors comparative Panda GateDefender Performa McAfee Secure Internet Gateway Trend Micro InterScan Gateway Security Appliance User based Security profiles LDAP integration P2P/IM Blocking Malware quarantine Content Filter Content Filter quarantine Automatic new malware remediation HTTP max. ThroughputUp to 510 MbpsUp to 200 Mbps Not published SMTP max. ThroughputUp to 220 Messages / secUp to 112 Messages / sec Not published Less performance No prevention against new malware No user profiles for different Security policies No Content Filter No IM/P2P Blocking No malware quarantine No Content Filter No IM/P2P Blocking No malware quarantine No directory services integration
17
17 Competitive Analysis
18
18 Frequently Asked Questions Panda GateDefender Performa
19
19 Frequently Asked Questions How long does it take to install? Panda GateDefender Performa takes less than 20 minutes to install and does not require traffic to be redirected or other network components to be reconfigured. The configuration can be done off-line and then be connected to the network. In addition it does not need maintenance after install With GateDefender Performa installed, can I get rid of workstation protection? It’s better to stop malware threats at the perimeter and dedicate server and workstation resources to productive purposes. But there are other indirect ways to infect the network like through CD/DVD, pendrives, roaming laptops, guest users, etc. A perimeter protection optimizes the internal protections efficiency as they don’t have to dedicate resources to cleaning malware infections, but it’s not a replacement. How can unknown malware be detected? The Genetic Heuristic Engine analyzes over 200 traces of evidence from files going through the appliance. This code is checked against a database of traits from different malware families in order to detect new variants that are not detected by antivirus signatures.
20
20
21
21
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.