GDP Product Presentation

20
1 Panda GateDefender Performa Your Proactive First Line of Defense Product Presentation Name

description

 

Transcript of GDP Product Presentation

Page 1: GDP Product Presentation

1

Panda GateDefender Performa

Your Proactive First Line of Defense

Product Presentation

Name

2008

Page 2: GDP Product Presentation

2

Security ConcernsWhat is Panda GateDefender Performa?How Does it Work?Competitive AnalysisFrequently Asked Questions

Panda GateDefender Performa

Page 3: GDP Product Presentation

3

Security Concerns

Panda GateDefender Performa

Page 4: GDP Product Presentation

4

Content Threats Affecting Organizations

MalwareInformation DestructionInfection of partners, clients…Time necessary to recover systems

Potentially risky ContentsDangerous contents inside the networkCritical information LeakNot job related documents download

SpamResource saturatione-mails resend by users or zombiesTime used to eliminate spam

Non relevant web contentsWaste of shared network resourcesIllegal or offensive contents resendTime used to browse not job related pages

P2P/IM ApplicationsAbusive use of network resourcesPiracy downloads / Illegal ChatsTime used for chatting, downloading…

Page 5: GDP Product Presentation

5

What is Panda GateDefender Performa?

Panda GateDefender Performa

Page 6: GDP Product Presentation

6

Panda GateDefender Performa is a high performance and complete SCM appliance that proactively protects the corporate network, against all content based threats, integrating seamlessly in your network architecture.

What is Panda GateDefender Performa?

SCM: Secure Content Management

“Panda GateDefender Performa is the most proactive appliance with least configuration and management costs.”

Yasuhiro Yamamoto, Nagoya City, Japan

Page 7: GDP Product Presentation

7

Benefits

Enables risk management

Increases users’ productivity

Contributes to the organization regulatory compliance

Avoids security complexity

Ensures business continuity

Reduces security operating costs

Page 8: GDP Product Presentation

8

Unmatched Security Data Processing

Daily Intelligence at Panda Research

4 MILLION PC Monitored 9 MILLION Unique Malwares Processed 96 MILLION Processes Monitored 340 MILLION Correlations of malware

Dedicated Research & Development team at PandaLabs monitor thousands of malware sites gathering 8 Terabytes of information

94.4% of all malware detected in 2007 was managed by Collective

Intelligence automatically

“It is a matter of survival for AV vendors, who increasingly are looking for ways to reinvent themselves as their product struggle to thwart new type of infections.

Cloud-based, collective intelligence services are the next big thing for anti-malware.

I expect that every AV vendor will need to embrace an approach like this if they expect to survive”

Yankee Group

Collective Intelligence

Page 9: GDP Product Presentation

9

How Does it Work?

Panda GateDefender Performa

Page 10: GDP Product Presentation

10

Internet

How Does it Work?

HTTP, FTP

SMTP, IMAP4, POP3

NNTP

Malware:

Suspect files:

Potential Risks:

Spam:

IM/P2P:

Unwanted web Content:

Disinfect or Delete

Quarantine, Clean and Restore

Block or Quarantine

Block or Quarantine

Block

Block

www.xxx.com

Page 11: GDP Product Presentation

11

Main Internet protocols scanned. HTTP, SMTP, POP3, FTP, IMAP4, NNTP

Scans inbound and outbound traffic

Combines proactive and reactive scan for total efficiency

Updates malware signatures every hour

Updates spam fingerprints every minute

Each protection is configured separately

Features

Page 12: GDP Product Presentation

12

Separated quarantine for malware, spam & content Filter

Integration with LDAP and Active Directory

User and group-based security profiles

Load balancing

Real-time graphic reports

Centralized monitoring through SMTP, SNMP or Syslog

Functionalities

Page 13: GDP Product Presentation

13

Models

Complete solution

Anti-MalwareAnti-Malware Protection

Content Filter Protection

Web Filter(URL) Web Filter Protection

IM/P2P Application Blocking

Anti-Spam Anti-Spam Protection

Modules included Protections included

8050 Up to 25 40 Mbps 80 Messages/second

8100 Up to 500 80 Mbps 160 Messages/second

8200 Up to 1200 170 Mbps 350 Messages/second

9500 Up to 2500 360 Mbps 740 Messages/second

Hardware Recommended HTTP SMTPModel Number of users Throughput Performance

Page 14: GDP Product Presentation

14

Competitive Analysis

Panda GateDefender Performa

Page 15: GDP Product Presentation

15

Identify competitors Keep it simple

•McAfee (Secure Internet Gateway) •Trend Micro (IGSA) •CP Secure (Content Security Gateway)

•Barracuda •IronPort •Symantec •Trend Micro (IWSA, IMSA) •McAfee (Secure web/messaging G A)

•Fortinet We offer an optimized robust solution•IBM-ISS… In fact our UTM is for small business

Real Direct competitorsWe offer more featureshigher performance more service quality

Indirect competitors

False competitors

We are more versatileWe scan all kind of traffic and threats

Competitive Analysis

Page 16: GDP Product Presentation

16

Competitive Analysis

Competitors comparative

PandaGateDefender Performa

McAfeeSecure Internet Gateway

Trend MicroInterScan Gateway Security

Appliance

User based Security profiles

LDAP integration

P2P/IM Blocking

Malware quarantine

Content Filter

Content Filter quarantine

Automatic new malware remediation

HTTP max. Throughput Up to 360 Mbps Up to 200 Mbps Not published

SMTP max. Throughput Up to 740 Messages / sec Up to 112 Messages / sec Not published

Less performanceNo prevention against new malwareNo user profiles for different Security policiesNo Content FilterNo IM/P2P BlockingNo malware quarantine

No Content FilterNo IM/P2P BlockingNo malware quarantineNo directory services integration

Page 17: GDP Product Presentation

17

Frequently Asked Questions

Panda GateDefender Performa

Page 18: GDP Product Presentation

18

Frequently Asked Questions

How long does it take to install? Panda GateDefender Performa takes less than 20 minutes to install and does not require traffic to be redirected or other network components to be reconfigured. The configuration can be done off-line and then be connected to the network. In addition it does not need maintenance after install

With GateDefender Performa installed, can I get rid of workstation protection?

It’s better to stop malware threats at the perimeter and dedicate server and workstation resources to productive purposes. But there are other indirect ways to infect the network like through CD/DVD, pendrives, roaming laptops, guest users, etc. A perimeter protection optimizes the internal protections efficiency as they don’t have to dedicate resources to cleaning malware infections, but it’s not a replacement.

How can unknown malware be detected?The Genetic Heuristic Engine analyzes over 200 traces of evidence from files going through the appliance. This code is checked against a database of traits from different malware families in order to detect new variants that are not detected by antivirus signatures.

Page 19: GDP Product Presentation

19

Page 20: GDP Product Presentation

20Revision 1.01 2008