Upload
tswong
View
1.087
Download
1
Tags:
Embed Size (px)
DESCRIPTION
Citation preview
1
Panda GateDefender Performa
Your Proactive First Line of Defense
Product Presentation
Name
2008
2
Security ConcernsWhat is Panda GateDefender Performa?How Does it Work?Competitive AnalysisFrequently Asked Questions
Panda GateDefender Performa
3
Security Concerns
Panda GateDefender Performa
4
Content Threats Affecting Organizations
MalwareInformation DestructionInfection of partners, clients…Time necessary to recover systems
Potentially risky ContentsDangerous contents inside the networkCritical information LeakNot job related documents download
SpamResource saturatione-mails resend by users or zombiesTime used to eliminate spam
Non relevant web contentsWaste of shared network resourcesIllegal or offensive contents resendTime used to browse not job related pages
P2P/IM ApplicationsAbusive use of network resourcesPiracy downloads / Illegal ChatsTime used for chatting, downloading…
5
What is Panda GateDefender Performa?
Panda GateDefender Performa
6
Panda GateDefender Performa is a high performance and complete SCM appliance that proactively protects the corporate network, against all content based threats, integrating seamlessly in your network architecture.
What is Panda GateDefender Performa?
SCM: Secure Content Management
“Panda GateDefender Performa is the most proactive appliance with least configuration and management costs.”
Yasuhiro Yamamoto, Nagoya City, Japan
7
Benefits
Enables risk management
Increases users’ productivity
Contributes to the organization regulatory compliance
Avoids security complexity
Ensures business continuity
Reduces security operating costs
8
Unmatched Security Data Processing
Daily Intelligence at Panda Research
4 MILLION PC Monitored 9 MILLION Unique Malwares Processed 96 MILLION Processes Monitored 340 MILLION Correlations of malware
Dedicated Research & Development team at PandaLabs monitor thousands of malware sites gathering 8 Terabytes of information
94.4% of all malware detected in 2007 was managed by Collective
Intelligence automatically
“It is a matter of survival for AV vendors, who increasingly are looking for ways to reinvent themselves as their product struggle to thwart new type of infections.
Cloud-based, collective intelligence services are the next big thing for anti-malware.
I expect that every AV vendor will need to embrace an approach like this if they expect to survive”
Yankee Group
Collective Intelligence
9
How Does it Work?
Panda GateDefender Performa
10
Internet
How Does it Work?
HTTP, FTP
SMTP, IMAP4, POP3
NNTP
Malware:
Suspect files:
Potential Risks:
Spam:
IM/P2P:
Unwanted web Content:
Disinfect or Delete
Quarantine, Clean and Restore
Block or Quarantine
Block or Quarantine
Block
Block
www.xxx.com
11
Main Internet protocols scanned. HTTP, SMTP, POP3, FTP, IMAP4, NNTP
Scans inbound and outbound traffic
Combines proactive and reactive scan for total efficiency
Updates malware signatures every hour
Updates spam fingerprints every minute
Each protection is configured separately
Features
12
Separated quarantine for malware, spam & content Filter
Integration with LDAP and Active Directory
User and group-based security profiles
Load balancing
Real-time graphic reports
Centralized monitoring through SMTP, SNMP or Syslog
Functionalities
13
Models
Complete solution
Anti-MalwareAnti-Malware Protection
Content Filter Protection
Web Filter(URL) Web Filter Protection
IM/P2P Application Blocking
Anti-Spam Anti-Spam Protection
Modules included Protections included
8050 Up to 25 40 Mbps 80 Messages/second
8100 Up to 500 80 Mbps 160 Messages/second
8200 Up to 1200 170 Mbps 350 Messages/second
9500 Up to 2500 360 Mbps 740 Messages/second
Hardware Recommended HTTP SMTPModel Number of users Throughput Performance
14
Competitive Analysis
Panda GateDefender Performa
15
Identify competitors Keep it simple
•McAfee (Secure Internet Gateway) •Trend Micro (IGSA) •CP Secure (Content Security Gateway)
•Barracuda •IronPort •Symantec •Trend Micro (IWSA, IMSA) •McAfee (Secure web/messaging G A)
•Fortinet We offer an optimized robust solution•IBM-ISS… In fact our UTM is for small business
Real Direct competitorsWe offer more featureshigher performance more service quality
Indirect competitors
False competitors
We are more versatileWe scan all kind of traffic and threats
Competitive Analysis
16
Competitive Analysis
Competitors comparative
PandaGateDefender Performa
McAfeeSecure Internet Gateway
Trend MicroInterScan Gateway Security
Appliance
User based Security profiles
LDAP integration
P2P/IM Blocking
Malware quarantine
Content Filter
Content Filter quarantine
Automatic new malware remediation
HTTP max. Throughput Up to 360 Mbps Up to 200 Mbps Not published
SMTP max. Throughput Up to 740 Messages / sec Up to 112 Messages / sec Not published
Less performanceNo prevention against new malwareNo user profiles for different Security policiesNo Content FilterNo IM/P2P BlockingNo malware quarantine
No Content FilterNo IM/P2P BlockingNo malware quarantineNo directory services integration
17
Frequently Asked Questions
Panda GateDefender Performa
18
Frequently Asked Questions
How long does it take to install? Panda GateDefender Performa takes less than 20 minutes to install and does not require traffic to be redirected or other network components to be reconfigured. The configuration can be done off-line and then be connected to the network. In addition it does not need maintenance after install
With GateDefender Performa installed, can I get rid of workstation protection?
It’s better to stop malware threats at the perimeter and dedicate server and workstation resources to productive purposes. But there are other indirect ways to infect the network like through CD/DVD, pendrives, roaming laptops, guest users, etc. A perimeter protection optimizes the internal protections efficiency as they don’t have to dedicate resources to cleaning malware infections, but it’s not a replacement.
How can unknown malware be detected?The Genetic Heuristic Engine analyzes over 200 traces of evidence from files going through the appliance. This code is checked against a database of traits from different malware families in order to detect new variants that are not detected by antivirus signatures.
19
20Revision 1.01 2008