GDI Product Presentation
Upcoming SlideShare
Loading in...5

GDI Product Presentation






Total Views
Views on SlideShare
Embed Views



1 Embed 1 1



Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
Post Comment
Edit your comment

GDI Product Presentation GDI Product Presentation Presentation Transcript

  • Panda GateDefender Integra Unified Business Protection Product Presentation Name 2008
  • Contents Security Concerns What is Panda GateDefender Integra? How Does it Work? Competitive Analysis Frequently Asked Questions
  • Panda GateDefender Integra Security Concerns
  • Content threats affecting the Organizations Malware Information Destruction Infection of partners, clients… Time necessary to recover systems Potentially risky Contents Dangerous contents inside the network Critical information Leak Not job related documents download Spam Resources saturation e-mails resend by users or zombies Time used to eliminate spam Non relevant web contents Waste of shared network resources Illegal or offensive contents resend Time used to browse not job related pages
  • Network Level threats affecting the Organizations Unknown connections Incontrollable number of connections Free access to internal information Security administration time Intrusions Information destruction Loss of Information Software use limitations Unprotected remote connections Unrestricted access to network resources Strangers access to relevant information Time to correct the actions
  • Panda GateDefender Integra What is Panda GateDefender Integra?
  • What is Panda GateDefender Integra?
    • Panda GateDefender Integra is a centralized perimeter prevention appliance against all kind of threats for small organizations and remote offices.
    • Panda GateDefender Integra is the most proactive UTM appliance that includes all the possible protections in an easy to use solution.
  • What is Panda GateDefender Integra?
    • Benefits
      • Reduces security complexity
      • Minimizes operating costs
      • Increases users’ productivity
      • Prevents sensitive data loss
  • Collective Intelligence Unmatched Security Data Processing Daily Intelligence at Panda Research 4 MILLION PC Monitored 9 MILLION Unique Malwares Processed 96 MILLION Processes Monitored 340 MILLION Correlations of malware Dedicated Research & Development team at PandaLabs monitor thousands of malware sites gathering 8 Terabytes of information 94.4% of all malware detected in 2007 was managed by Collective Intelligence automatically “ It is a matter of survival for AV vendors, who increasingly are looking for ways to reinvent themselves as their product struggle to thwart new type of infections. Cloud-based, collective intelligence services are the next big thing for anti-malware . I expect that every AV vendor will need to embrace an approach like this if they expect to survive” Yankee Group
  • Panda GateDefender Integra How Does it Work?
  • How Does it Work? INTERNET Gateway Network level threats Content based threats Firewall IPS Anti malware Anti spam VPN Attacks through unknown connections Information theft on sending it Unknown attacks Known or unknown Malware Content Filter Potential risks Spam Web Filter Unwished web contents
  • Features
    • All in one: Firewall, IPS, VPN, Anti-malware, Content Filter, Anti-spam & Web Filter
    • Main Internet protocols scanned: HTTP, SMTP, POP3, FTP, IMAP4, NNTP
    • Scans inbound and outbound traffic
    • Combines proactive and reactive scan for total efficiency
    • Updates malware signatures every 90 minutes and spam every minute
    • Easy to use
  • Functionalities
    • Deep Packet Inspection Firewall
    • All VPN types: IPSec, SSL, PPTP and L2TP
    • All VPN configurations: Host to Host, Host to Net and Net to Net VPN
    • Over 5000 Intrusion Prevention rules for all IP protocols (ICMP, UDP, TCP)
    • Real-time graphic reports
    • Centralized monitoring through SMTP, SNMP or Syslog
    • NTP time synchronization
  • Models
    • All in one solution
    Anti-Malware Web Filter Anti-Spam Included Modules Included Protections Network Firewall IPS VPN Anti-Malware Protection Content Filter Protection Anti-spam Protection (URL) Web Filter Protection Concurrent sessions Firewall throughput Up to 100 Recommended number of users Up to 250 330 Mbps 850 Mbps 550.000 350.000 GateDefender Integra 100 GateDefender Integra 300 10/100/1000 Ethernet ports 8 4
  • Panda GateDefender Integra Competitive Analysis
  • Competitive Analysis
    • Direct competitors
    • Many details to bear in mind on deciding
      • Integration of all protections in just one device
      • Best of breed for all content protections
        • Panda, Cloudmark & Cobion
      • Proactive and reactive protection combination
      • Quality/Price/Features relationship
      • Easy to use interface
  • Competitive Analysis
    • Which one is faster?
    Firewall Throughput comparison Mbps Source: Official Data Sheets
  • Competitive Analysis
    • Which one is more preventive
    5000+ 3100 2998 1300 2500 Source: Official Data Sheets
  • Competitive Analysis
    • Which one is more competitive in price?
  • Panda GateDefender Integra Frequently Asked Questions
  • FAQ
    • I have a Firewall as my perimeter protection
        • Many threats can trespass the firewall since it does not avoid intrusions through allowed connections. In addition, files arrived in the network can contain malware that is not blocked by the Firewall, either.
    • I have a Firewall/VPN and also an IPS
        • This way, networks threats are stopped, but the best result is obtained when IPS is integrated with the firewall. On the other hand, content based threats need to be stopped at the perimeter for an effective protection
    • Installing Integra, can I avoid workstations protection?
        • It’s better to stop malware threats at the perimeter and dedicate server and workstation resources to productive purposes. But there are other indirect ways to infect the network like through CD/DVD, pendrives, roaming laptops, guest users, etc. A perimeter protection optimizes the internal protections efficiency as they don’t have to dedicate resources to cleaning malware infections, but it’s not a replacement.
  • Revision 1.01 2008