GDP Product Presentation


Published on

Published in: Business, Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • GDP Product Presentation

    1. 1. Panda GateDefender Performa Your Proactive First Line of Defense Product Presentation Name 2008
    2. 2. Panda GateDefender Performa Security Concerns What is Panda GateDefender Performa? How Does it Work? Competitive Analysis Frequently Asked Questions
    3. 3. Panda GateDefender Performa Security Concerns
    4. 4. Content Threats Affecting Organizations Malware Information Destruction Infection of partners, clients… Time necessary to recover systems Potentially risky Contents Dangerous contents inside the network Critical information Leak Not job related documents download Spam Resource saturation e-mails resend by users or zombies Time used to eliminate spam Non relevant web contents Waste of shared network resources Illegal or offensive contents resend Time used to browse not job related pages P2P/IM Applications Abusive use of network resources Piracy downloads / Illegal Chats Time used for chatting, downloading…
    5. 5. Panda GateDefender Performa What is Panda GateDefender Performa?
    6. 6. <ul><li>Panda GateDefender Performa is a high performance and complete SCM appliance that proactively protects the corporate network, against all content based threats, integrating seamlessly in your network architecture. </li></ul>What is Panda GateDefender Performa? SCM: Secure Content Management “ Panda GateDefender Performa is the most proactive appliance with least configuration and management costs.” Yasuhiro Yamamoto, Nagoya City, Japan
    7. 7. Benefits <ul><li>Enables risk management </li></ul><ul><li>Increases users’ productivity </li></ul><ul><li>Contributes to the organization regulatory compliance </li></ul><ul><li>Avoids security complexity </li></ul><ul><li>Ensures business continuity </li></ul><ul><li>Reduces security operating costs </li></ul>
    8. 8. Unmatched Security Data Processing Daily Intelligence at Panda Research 4 MILLION PC Monitored 9 MILLION Unique Malwares Processed 96 MILLION Processes Monitored 340 MILLION Correlations of malware Dedicated Research & Development team at PandaLabs monitor thousands of malware sites gathering 8 Terabytes of information 94.4% of all malware detected in 2007 was managed by Collective Intelligence automatically “ It is a matter of survival for AV vendors, who increasingly are looking for ways to reinvent themselves as their product struggle to thwart new type of infections. Cloud-based, collective intelligence services are the next big thing for anti-malware . I expect that every AV vendor will need to embrace an approach like this if they expect to survive” Yankee Group Collective Intelligence
    9. 9. Panda GateDefender Performa How Does it Work?
    10. 10. How Does it Work? HTTP, FTP SMTP, IMAP4, POP3 NNTP Malware: Suspect files: Potential Risks: Spam: IM/P2P: Unwanted web Content: Disinfect or Delete Quarantine, Clean and Restore Block or Quarantine Block or Quarantine Block Block Internet
    11. 11. Features <ul><li>Main Internet protocols scanned. HTTP, SMTP, POP3, FTP, IMAP4, NNTP </li></ul><ul><li>Scans inbound and outbound traffic </li></ul><ul><li>Combines proactive and reactive scan for total efficiency </li></ul><ul><li>Updates malware signatures every hour </li></ul><ul><li>Updates spam fingerprints every minute </li></ul><ul><li>Each protection is configured separately </li></ul>
    12. 12. Functionalities <ul><li>Separated quarantine for malware, spam & content Filter </li></ul><ul><li>Integration with LDAP and Active Directory </li></ul><ul><li>User and group-based security profiles </li></ul><ul><li>Load balancing </li></ul><ul><li>Real-time graphic reports </li></ul><ul><li>Centralized monitoring through SMTP, SNMP or Syslog </li></ul>
    13. 13. Models <ul><li>Complete solution </li></ul>Anti-Malware Anti-Malware Protection Content Filter Protection Web Filter (URL) Web Filter Protection IM/P2P Application Blocking Anti-Spam Anti-Spam Protection Modules included Protections included 8050 Up to 25 40 Mbps 80 Messages/second 8100 Up to 500 80 Mbps 160 Messages/second 8200 Up to 1200 170 Mbps 350 Messages/second 9500 Up to 2500 360 Mbps 740 Messages/second Hardware Recommended HTTP SMTP Model Number of users Throughput Performance
    14. 14. Panda GateDefender Performa Competitive Analysis
    15. 15. Competitive Analysis
    16. 16. Competitive Analysis Not published Up to 200 Mbps Up to 360 Mbps HTTP max. Throughput Not published Up to 112 Messages / sec Up to 740 Messages / sec SMTP max. Throughput Automatic new malware remediation Content Filter quarantine Content Filter Malware quarantine P2P/IM Blocking LDAP integration User based Security profiles Trend Micro InterScan Gateway Security Appliance McAfee Secure Internet Gateway Panda GateDefender Performa Competitors comparative Less performance No prevention against new malware No user profiles for different Security policies No Content Filter No IM/P2P Blocking No malware quarantine No Content Filter No IM/P2P Blocking No malware quarantine No directory services integration
    17. 17. Panda GateDefender Performa Frequently Asked Questions
    18. 18. Frequently Asked Questions <ul><li>How long does it take to install? </li></ul><ul><ul><ul><li>Panda GateDefender Performa takes less than 20 minutes to install and does not require traffic to be redirected or other network components to be reconfigured. The configuration can be done off-line and then be connected to the network . In addition it does not need maintenance after install </li></ul></ul></ul><ul><li>With GateDefender Performa installed, can I get rid of workstation protection? </li></ul><ul><ul><ul><li>It’s better to stop malware threats at the perimeter and dedicate server and workstation resources to productive purposes. But there are other indirect ways to infect the network like through CD/DVD, pendrives, roaming laptops, guest users, etc. A perimeter protection optimizes the internal protections efficiency as they don’t have to dedicate resources to cleaning malware infections, but it’s not a replacement. </li></ul></ul></ul><ul><li>How can unknown malware be detected? </li></ul><ul><ul><ul><li>The Genetic Heuristic Engine analyzes over 200 traces of evidence from files going through the appliance. This code is checked against a database of traits from different malware families in order to detect new variants that are not detected by antivirus signatures. </li></ul></ul></ul>
    19. 20. Revision 1.01 2008