gdi product presentation
DESCRIPTION
TRANSCRIPT
1
Panda GateDefender Integra
Unified Business Protection
Product Presentation
Name
2008
2
Security ConcernsWhat is Panda GateDefender Integra?How Does it Work?Competitive AnalysisFrequently Asked Questions
Contents
3
Security Concerns
Panda GateDefender Integra
4
Content threats affecting the Organizations
MalwareInformation DestructionInfection of partners, clients…Time necessary to recover systems
Potentially risky ContentsDangerous contents inside the networkCritical information LeakNot job related documents download
SpamResources saturatione-mails resend by users or zombiesTime used to eliminate spam
Non relevant web contentsWaste of shared network resourcesIllegal or offensive contents resendTime used to browse not job related pages
5
Network Level threats affecting the Organizations
Unknown connectionsIncontrollable number of connectionsFree access to internal informationSecurity administration time
IntrusionsInformation destructionLoss of InformationSoftware use limitations
Unprotected remote connectionsUnrestricted access to network resourcesStrangers access to relevant informationTime to correct the actions
6
What is Panda GateDefender Integra?
Panda GateDefender Integra
7
What is Panda GateDefender Integra?
Panda GateDefender Integra is a centralized perimeter prevention appliance against all kind of threats for small organizations and remote offices.
Panda GateDefender Integra is the most proactive UTM appliance that includes all the possible protections in an easy to use solution.
8
What is Panda GateDefender Integra?
Benefits
– Reduces security complexity
– Minimizes operating costs
– Increases users’ productivity
– Prevents sensitive data loss
9
Unmatched Security Data Processing
Daily Intelligence at Panda Research
4 MILLION PC Monitored 9 MILLION Unique Malwares Processed 96 MILLION Processes Monitored 340 MILLION Correlations of malware
Dedicated Research & Development team at PandaLabs monitor thousands of malware sites gathering 8 Terabytes of information
94.4% of all malware detected in 2007 was managed by Collective
Intelligence automatically
“It is a matter of survival for AV vendors, who increasingly are looking for ways to reinvent themselves as their product struggle to thwart new type of infections.
Cloud-based, collective intelligence services are the next big thing for anti-malware.
I expect that every AV vendor will need to embrace an approach like this if they expect to survive”
Yankee Group
Collective Intelligence
10
How Does it Work?
Panda GateDefender Integra
11
Gateway
Network level threats
Content based threats
Firewall IPS Anti
malware
Anti
spam
VPNAttacks through unknown connections
Information theft on sending it
Unknown attacks
Known or unknown Malware
Content
Filter
Potential risks
INTERNET
Spam
Web
Filter
Unwished web contents
How Does it Work?
12
All in one: Firewall, IPS, VPN, Anti-malware, Content Filter, Anti-spam & Web Filter
Main Internet protocols scanned: HTTP, SMTP, POP3, FTP, IMAP4, NNTP
Scans inbound and outbound traffic
Combines proactive and reactive scan for total efficiency
Updates malware signatures every 90 minutes and spam every minute
Easy to use
Features
13
Deep Packet Inspection Firewall
All VPN types: IPSec, SSL, PPTP and L2TP
All VPN configurations: Host to Host, Host to Net and Net to Net VPN
Over 5000 Intrusion Prevention rules for all IP protocols (ICMP, UDP, TCP)
Real-time graphic reports
Centralized monitoring through SMTP, SNMP or Syslog
NTP time synchronization
Functionalities
14
Models
All in one solution
Anti-Malware
Web Filter
Anti-Spam
Included Modules Included Protections
NetworkFirewall
IPSVPN
Anti-Malware Protection
Content Filter Protection
Anti-spam Protection
(URL) Web Filter Protection
Concurrent sessions
Firewall throughput
Up to 100
Recommended number of users
Up to 250
330 Mbps
850 Mbps 550.000
350.000GateDefender Integra 100
GateDefender Integra 300
10/100/1000 Ethernet ports
8
4
15
Competitive Analysis
Panda GateDefender Integra
16
Competitive Analysis
Direct competitors
Many details to bear in mind on deciding– Integration of all protections in just one device
– Best of breed for all content protections • Panda, Cloudmark & Cobion
– Proactive and reactive protection combination
– Quality/Price/Features relationship
– Easy to use interface
17
Competitive Analysis
Which one is faster?
70
80
100
100
150
260
330
0 50 100 150 200 250 300 350
FortiGate 60
Astaro SG110/120
Symantec SGS1620
FortiGate 100
FortiGate 200
Astaro SG 220
GateDefenderIntegra 100
200
200
400
450
420
500
850
0 200 400 600 800 1000
Symantec SGS1660
ISS ProventiaM30
FortiGate 300
FortiGate 400
Astaro SG 320
FortiGate 500
GateDefenderIntegra 300
Firewall Throughput comparison Mbps
Source: Official Data Sheets
18
Competitive Analysis
Which one is more preventive
0500
100015002000250030003500400045005000
Panda Symantec Astaro ISS Fortinet
Detected Intrusions and Attacks comparison
5000+ 3100 2998 13002500
Source: Official Data Sheets
19
Competitive Analysis
Which one is more competitive in price?
0 €
2.0
00 €
4.0
00 €
6.0
00 €
8.0
00 €
10.0
00 €
12.0
00 €
14.0
00 €
Symantec 1620
Fortigate 60
Astaro 120
Fortigate 100
GateDefender Integra 100
Symantec 1660
Fortigate 200
Astaro 220
GateDefender Integra 300
Fortigate 300
1 Year price comparative
20
Frequently Asked Questions
Panda GateDefender Integra
21
FAQ
I have a Firewall as my perimeter protectionMany threats can trespass the firewall since it does not avoid intrusions through allowed connections. In addition, files arrived in the network can contain malware that is not blocked by the Firewall, either.
I have a Firewall/VPN and also an IPSThis way, networks threats are stopped, but the best result is obtained when IPS is integrated with the firewall. On the other hand, content based threats need to be stopped at the perimeter for an effective protection
Installing Integra, can I avoid workstations protection?It’s better to stop malware threats at the perimeter and dedicate server and workstation resources to productive purposes. But there are other indirect ways to infect the network like through CD/DVD, pendrives, roaming laptops, guest users, etc. A perimeter protection optimizes the internal protections efficiency as they don’t have to dedicate resources to cleaning malware infections, but it’s not a replacement.
22
23Revision 1.01 2008