Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 Panda GateDefender Performa Your First Line of Defense Product Presentation Name 2008.

Similar presentations


Presentation on theme: "1 Panda GateDefender Performa Your First Line of Defense Product Presentation Name 2008."— Presentation transcript:

1 1 Panda GateDefender Performa Your First Line of Defense Product Presentation Name 2008

2 2 Security Concerns What is Panda GateDefender Performa? How Does it Work? Competitive Analysis Frequently Asked Questions Panda GateDefender Performa

3 3 Security Concerns Panda GateDefender Performa

4 4 Content Threats Affecting Organizations Malware Information Destruction Infection of partners, clients… Time necessary to recover systems Potentially risky Contents Dangerous contents inside the network Critical information Leak Not job related documents download Spam Resource saturation e-mails resend by users or zombies Time used to eliminate spam Non relevant web contents Waste of shared network resources Illegal or offensive contents resend Time to browse through not job related pages P2P/IM Applications Abusive use of network resources Piracy downloads / Illegal Chats Time used for chatting, downloading…

5 5 What is Panda GateDefender Performa? Panda GateDefender Performa

6 6 Panda GateDefender Performa is a high performance and complete SCM appliance that proactively protects the corporate network, against all content based threats, integrating seamlessly in your network architecture. What is Panda GateDefender Performa? SCM: Secure Content Management EFFICIENCY

7 7 Benefits  Avoids security complexity  Increases users’ productivity  Reduces security operating costs  Contributes to the organization regulatory compliance  Enables risk management  Ensures business continuity

8 8 How Does it Work? Panda GateDefender Performa

9 99 Internet How Does it Work? HTTP, FTP SMTP, IMAP4, POP3 NNTP Malware: Suspect files: Potential Risks: Spam: IM/P2P: Unwanted web Content: Disinfect or Delete Quarantine, Clean and Restore Delete or Quarantine Block www.xxx.com

10 10  Proactive integrated technology. Heuristic Engine, Collective Intelligence & Quarantine  Main Internet protocols scanned. HTTP, SMTP, POP3, FTP, IMAP4, NNTP  Scans inbound and outbound traffic  Combines proactive and reactive scan for total efficiency  Updates malware signatures every hour  Updates spam fingerprints every minute  Unattended Protection Features

11 11  Separated quarantine for Malware, Spam & Content Filter  Integration with LDAP and Active Directory  User and group-based security profiles  Centralized Configuration  Real-time Centralized Graphic Monitoring  High Performance and Scalability  Plug in and Forget Functionalities

12 12 Models Complete solution Anti-Malware Anti-Malware Protection Content Filter Protection Web Filter (URL) Web Filter Protection IM/P2P Application Blocking Anti-Spam Anti-Spam Protection Modules includedProtections included TOTAL PROTECTION

13 13 Competitive Analysis Panda GateDefender Performa

14 14 Competitive Analysis Identify the CompetitorsMake it Simple Real or direct Competitors McAfee (Secure Internet Gateway) Trend Micro (IGSA) CP Secure (Content Security Gateway) We offer more functionalities We have higher Performance We offer better quality of service Indirect Competitors Barracuda IronPort Symantec Trend Micro (IWSA, IMSA) McAfee (Secure web/messaging GS) Our product is more versatile We scan all kind of traffic and threats False Competitors Fortinet IBM-ISS We offer a robust and optimized solution We also have a UTM for small business

15 15 Competitive Analysis

16 16 Competitive Analysis Competitors comparative Panda GateDefender Performa McAfee Secure Internet Gateway Trend Micro InterScan Gateway Security Appliance User based Security profiles LDAP integration P2P/IM Blocking Malware quarantine Content Filter Content Filter quarantine Automatic new malware remediation HTTP max. ThroughputUp to 510 MbpsUp to 200 Mbps Not published SMTP max. ThroughputUp to 220 Messages / secUp to 112 Messages / sec Not published Less performance No prevention against new malware No user profiles for different Security policies No Content Filter No IM/P2P Blocking No malware quarantine No Content Filter No IM/P2P Blocking No malware quarantine No directory services integration

17 17 Competitive Analysis

18 18 Frequently Asked Questions Panda GateDefender Performa

19 19 Frequently Asked Questions How long does it take to install? Panda GateDefender Performa takes less than 20 minutes to install and does not require traffic to be redirected or other network components to be reconfigured. The configuration can be done off-line and then be connected to the network. In addition it does not need maintenance after install With GateDefender Performa installed, can I get rid of workstation protection? It’s better to stop malware threats at the perimeter and dedicate server and workstation resources to productive purposes. But there are other indirect ways to infect the network like through CD/DVD, pendrives, roaming laptops, guest users, etc. A perimeter protection optimizes the internal protections efficiency as they don’t have to dedicate resources to cleaning malware infections, but it’s not a replacement. How can unknown malware be detected? The Genetic Heuristic Engine analyzes over 200 traces of evidence from files going through the appliance. This code is checked against a database of traits from different malware families in order to detect new variants that are not detected by antivirus signatures.

20 20

21 21


Download ppt "1 Panda GateDefender Performa Your First Line of Defense Product Presentation Name 2008."

Similar presentations


Ads by Google