SlideShare a Scribd company logo
1 of 29
MAM International Corporation

Company and Product Introduction
gateProtect: What we do




  gateProtect specializes in
 “Next generation Firewall”
gateProtect: What‘s in it for you?
   Raise the bottom line               Open up new
 for services by up to 80%!          business segments!




Revolutionary visualization-   Sell additional highly profitable
  based interface (eGUI)        services (Managed Security)
gateProtect: What‘s in it for you?
Raise network security level




                               Remove human error
                                from the equation
gateProtect: Who we are
   Founded in 2002

   140 employees
     • 84 Research & Development, Tech Support
     • 42 Sales & Marketing

   Sales departments in 15 countries

   Leading European manufacturer
    and Made in Germany

   Represented Yemen by MAM
Who says we’re leading?



   gateProtect is listed in
    the Gartner Magic Quadrant

   Gartner asked to list us
    in their Magic Quadrant
Who else says we’re leading?



   gateProtect has been given the
    Frost & Sullivan Excellence Award
    “gateProtect provides UTM products that stand-out from the competition
    due to their ease-of-use and security effectiveness. The gateProtect
    ergonomic graphical user interface (eGUI) provides the most intuitive and
    effective visual UTM management interface available in the marketplace.”

    Frost & Sullivan, August 2011
Who else says we’re leading?

“The gateProtect is a monster
           UTM.”




 “Smoking-hot new firewall”




       “The Ferrari of
    firewall appliances”
Who else says we’re leading?
Our customers, with 40,000 gateProtect installations in Europe
gateProtect Next generation Firewalls
                                                                                                                                        Large enterprises
10.000
         Performance / Throughput (Mbps)


                                                                                                                                         GPZ 2500




                                                                                                                 Enterprises
 5.000
                                                                                                                 GPX 800
                                                                                                                                       GPX 1000


 2.000                                                                           Medium enterprises   GPA 600
                                                                                  GPA 400
 1.000

                                                             Small enterprises
  800
                                                              GPA 250

  500                     Small & remote offices
                                                   GPO 125
  200
                            GPO75
                                                                                                                 VPN Acceleration
                                           10       25                   50              100               250         500     1.000       5.000       10.000   Users
gateProtect Features


     All features Next Generation Firewall features like
gateProtect offersare being incorporated into one central system …
                   a variety of state-of-the-art security


                         Web-Filter &         Anti-Virus &
Intrusion Prevention                                          Traffic shaping
                         Anti-Phishing        Anti-Spyware




                       Instant Messaging     Zero-hour Spam
      Firewall                                                VPN IPSec & SSL
                        Filter (for Skype)      Protection
gateProtect special Features

Seven Multiple Internet Connections

- Simultaneous use of up to 7 internet connections for
  more Internet speed

- Failover function, backup line will immedialty take
  over the connection
gateProtect special Features

Best Traffic-shaping &
bandwith-management in the Market

- Maximum and minimum bandwidth can be
  specified for each user, computer, group etc. & for
  EACH service

- Bandwidth distribution can be configured to any
  level of detail.
gateProtect special Features

HTTPS Scan
Virus Protection also in HTTPS Traffic


- gateProtect scan encrypted HTTPS connections
  i.e. viruses, trojans, etc.

- All HTTPS data flow gets decrypted and analyzed.
gateProtect special Features

 Layer-8 technology


- With gateProtect every single user will
  receive his own detailed rights

- All services/ protocolls (65.000) can be
  broken down to the single user.
gateProtect special Features

VPN SSL with X.509 certificates

- By using gateProtect VPN SSL x.509 much more
  flexibility is gained

- There are no limits, all services can be used (not
  only HTTP)
gateProtect special Features

QoS TOS-flags within VPN tunnels


- With gateProtect its possible to set flag types (8
  Bits) in the VPN Tunnel

- That is very important for VoIP or other critical
  applications like ERP/CRM or onlineshops.
The Cause: IT Security Complexity Loop
                                 Security threat
                                 sophistication
                                   increases


                                                 Response:
                Result: Increased
                                             Increase IT safety
              complexity/difficulty
                                               sophistication


                                   Leads to:
                                  Higher cost,
                                   workload
Competitor User Interfaces
            What could that lead to?
Rule-based firewalls escalate human error

                                                                  98%
                  Rule-based                                   human errors
                   firewalls


                        2%
                  technical errors



                                        Potential for error
                                     increases exponentially
The solution: gateProtect eGUI Technology
 gateProtect developed eGUI technology to
  revolutionize the management interface:




                                            Remove human error
                                             from the equation
eGUI UTM in action: The Demo


   Let’s see how eGUI reduces
    cost, errors, and time…
eGUI breaks the complexity loop

                   Security threat
                   sophistication
                     increases

                                    Response:
  Result: Increased
                                Increase IT safety
complexity/difficulty
                                  sophistication

                      Leads to:
                       Higher
                   cost, workload



      Break the complexity loop...                   …by attacking it in three dimensions
Reduction of Time via merging Rules
Reduction of Error Rate through Visualization
Reduction of Operating Costs
gateProtect Command Center
                   For central management of up to 500 gateProtect appliances
                                (small MSSPs or larger customers)

   Server-based product
   Central control of…
      – Monitoring/reporting
      – Backup management
      – License management
      – VPN setup
      – Rollouts
Commandcenter in action: The Demo


   Let’s see how the Command
    Center reduces cost, errors,
    and time…
The gateProtect Team: Dedicated to supporting YOU




                       Partnering with Almasa IT Distribution FZCO, Dubai, UAE, 00971-4-3063101
Ongoing R&D   24/7 support hotline        Training and certification           Valuable marketing tools

More Related Content

What's hot

Fortinet Icon Library
Fortinet Icon LibraryFortinet Icon Library
Fortinet Icon LibraryFortinet
 
Retail Stores and Wireless Security—Recommendations
Retail Stores and Wireless Security—RecommendationsRetail Stores and Wireless Security—Recommendations
Retail Stores and Wireless Security—RecommendationsAirTight Networks
 
Fortinet security ecosystem
Fortinet security ecosystemFortinet security ecosystem
Fortinet security ecosystemMark Oakton
 
TEUNO Summit - Presentaciones
TEUNO Summit - PresentacionesTEUNO Summit - Presentaciones
TEUNO Summit - PresentacionesTEUNO
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012Jimmy Saigon
 
CyberoamNGSeriesUTMBrochure
CyberoamNGSeriesUTMBrochureCyberoamNGSeriesUTMBrochure
CyberoamNGSeriesUTMBrochureBaqar kazmi
 
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber SecurityVTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber SecurityShane Glenn
 
Threat Landscape for Education
Threat Landscape for EducationThreat Landscape for Education
Threat Landscape for EducationColloqueRISQ
 
Presentation fortinet securing the cloud
Presentation   fortinet securing the cloudPresentation   fortinet securing the cloud
Presentation fortinet securing the cloudxKinAnx
 
ICT Security 2010: Le minacce delle nuove tecnologie
ICT Security 2010: Le minacce delle nuove tecnologieICT Security 2010: Le minacce delle nuove tecnologie
ICT Security 2010: Le minacce delle nuove tecnologieAlessio Pennasilico
 
10 Steps To a Successful IP Surveillance Installation
10 Steps To a Successful IP Surveillance Installation10 Steps To a Successful IP Surveillance Installation
10 Steps To a Successful IP Surveillance InstallationShein Myint Aung
 
Partner Zymbian & Fortinet webinar on Web2.0 security
Partner Zymbian & Fortinet webinar on Web2.0 securityPartner Zymbian & Fortinet webinar on Web2.0 security
Partner Zymbian & Fortinet webinar on Web2.0 securityZymbian
 
Wireless Vulnerability Management: What It Means for Your Enterprise
Wireless Vulnerability Management: What It Means for Your EnterpriseWireless Vulnerability Management: What It Means for Your Enterprise
Wireless Vulnerability Management: What It Means for Your EnterpriseAirTight Networks
 
Csa summit argentina-reavis
Csa summit   argentina-reavisCsa summit   argentina-reavis
Csa summit argentina-reavisCSA Argentina
 
Demystifying Industrial Security
Demystifying Industrial SecurityDemystifying Industrial Security
Demystifying Industrial Securityteam-WIBU
 
5 star technology advertising 2015
5 star technology advertising 20155 star technology advertising 2015
5 star technology advertising 2015leopoldgiterson
 
NAC Solution Taarak
NAC Solution TaarakNAC Solution Taarak
NAC Solution TaarakMohit8780
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should KnowIBM Security
 

What's hot (20)

Fortinet Icon Library
Fortinet Icon LibraryFortinet Icon Library
Fortinet Icon Library
 
Retail Stores and Wireless Security—Recommendations
Retail Stores and Wireless Security—RecommendationsRetail Stores and Wireless Security—Recommendations
Retail Stores and Wireless Security—Recommendations
 
Fortinet security ecosystem
Fortinet security ecosystemFortinet security ecosystem
Fortinet security ecosystem
 
Check Point Consolidation
Check Point ConsolidationCheck Point Consolidation
Check Point Consolidation
 
TEUNO Summit - Presentaciones
TEUNO Summit - PresentacionesTEUNO Summit - Presentaciones
TEUNO Summit - Presentaciones
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
 
CyberoamNGSeriesUTMBrochure
CyberoamNGSeriesUTMBrochureCyberoamNGSeriesUTMBrochure
CyberoamNGSeriesUTMBrochure
 
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber SecurityVTI Learning Series Beyond the Convergence of Physical & Cyber Security
VTI Learning Series Beyond the Convergence of Physical & Cyber Security
 
Ccie security 01
Ccie security 01Ccie security 01
Ccie security 01
 
Threat Landscape for Education
Threat Landscape for EducationThreat Landscape for Education
Threat Landscape for Education
 
Presentation fortinet securing the cloud
Presentation   fortinet securing the cloudPresentation   fortinet securing the cloud
Presentation fortinet securing the cloud
 
ICT Security 2010: Le minacce delle nuove tecnologie
ICT Security 2010: Le minacce delle nuove tecnologieICT Security 2010: Le minacce delle nuove tecnologie
ICT Security 2010: Le minacce delle nuove tecnologie
 
10 Steps To a Successful IP Surveillance Installation
10 Steps To a Successful IP Surveillance Installation10 Steps To a Successful IP Surveillance Installation
10 Steps To a Successful IP Surveillance Installation
 
Partner Zymbian & Fortinet webinar on Web2.0 security
Partner Zymbian & Fortinet webinar on Web2.0 securityPartner Zymbian & Fortinet webinar on Web2.0 security
Partner Zymbian & Fortinet webinar on Web2.0 security
 
Wireless Vulnerability Management: What It Means for Your Enterprise
Wireless Vulnerability Management: What It Means for Your EnterpriseWireless Vulnerability Management: What It Means for Your Enterprise
Wireless Vulnerability Management: What It Means for Your Enterprise
 
Csa summit argentina-reavis
Csa summit   argentina-reavisCsa summit   argentina-reavis
Csa summit argentina-reavis
 
Demystifying Industrial Security
Demystifying Industrial SecurityDemystifying Industrial Security
Demystifying Industrial Security
 
5 star technology advertising 2015
5 star technology advertising 20155 star technology advertising 2015
5 star technology advertising 2015
 
NAC Solution Taarak
NAC Solution TaarakNAC Solution Taarak
NAC Solution Taarak
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know
 

Similar to Gate protect presentation

CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochureMaliha Ali
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochurebakar kazmi
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochureMaliha Ali
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochureBaqar kazmi
 
Cyberoam-Brochure
Cyberoam-BrochureCyberoam-Brochure
Cyberoam-BrochureBaqar Kazmi
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochureBaqar Kazmi
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochureMaliha Ali
 
Astaro asia product-presentation-updated 21-feb11
Astaro asia product-presentation-updated 21-feb11Astaro asia product-presentation-updated 21-feb11
Astaro asia product-presentation-updated 21-feb11Fajar Isnanto
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012Jimmy Saigon
 
Wifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15wiWifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15winiravmahida
 
An introduction to Huawei Symantec
An introduction to Huawei SymantecAn introduction to Huawei Symantec
An introduction to Huawei SymantecUtopia Media
 
CyberoamNGSeriesUTMBrochure
CyberoamNGSeriesUTMBrochureCyberoamNGSeriesUTMBrochure
CyberoamNGSeriesUTMBrochurebakar kazmi
 
Routeco cyber security and secure remote access 1 01
Routeco cyber security and secure remote access 1 01Routeco cyber security and secure remote access 1 01
Routeco cyber security and secure remote access 1 01RoutecoMarketing
 
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...NetworkCollaborators
 
Cloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future ChallangesCloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future ChallangesMichele Vecchione
 

Similar to Gate protect presentation (20)

XTM moving security forward
XTM moving security forwardXTM moving security forward
XTM moving security forward
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
Cyberoam-Brochure
Cyberoam-BrochureCyberoam-Brochure
Cyberoam-Brochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
Astaro asia product-presentation-updated 21-feb11
Astaro asia product-presentation-updated 21-feb11Astaro asia product-presentation-updated 21-feb11
Astaro asia product-presentation-updated 21-feb11
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
 
Wifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15wiWifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15wi
 
An introduction to Huawei Symantec
An introduction to Huawei SymantecAn introduction to Huawei Symantec
An introduction to Huawei Symantec
 
CyberoamNGSeriesUTMBrochure
CyberoamNGSeriesUTMBrochureCyberoamNGSeriesUTMBrochure
CyberoamNGSeriesUTMBrochure
 
FortiGate-60C
FortiGate-60CFortiGate-60C
FortiGate-60C
 
CONSULTCORP CYBEROAM CR200ING
CONSULTCORP CYBEROAM CR200INGCONSULTCORP CYBEROAM CR200ING
CONSULTCORP CYBEROAM CR200ING
 
FortiGate-40C
FortiGate-40CFortiGate-40C
FortiGate-40C
 
Routeco cyber security and secure remote access 1 01
Routeco cyber security and secure remote access 1 01Routeco cyber security and secure remote access 1 01
Routeco cyber security and secure remote access 1 01
 
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
 
Emc World Keynote Mirchandani
Emc World Keynote MirchandaniEmc World Keynote Mirchandani
Emc World Keynote Mirchandani
 
Cloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future ChallangesCloud Security @ TIM - Current Practises and Future Challanges
Cloud Security @ TIM - Current Practises and Future Challanges
 

Recently uploaded

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 

Recently uploaded (20)

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 

Gate protect presentation

  • 1. MAM International Corporation Company and Product Introduction
  • 2. gateProtect: What we do gateProtect specializes in “Next generation Firewall”
  • 3. gateProtect: What‘s in it for you? Raise the bottom line Open up new for services by up to 80%! business segments! Revolutionary visualization- Sell additional highly profitable based interface (eGUI) services (Managed Security)
  • 4. gateProtect: What‘s in it for you? Raise network security level Remove human error from the equation
  • 5. gateProtect: Who we are  Founded in 2002  140 employees • 84 Research & Development, Tech Support • 42 Sales & Marketing  Sales departments in 15 countries  Leading European manufacturer and Made in Germany  Represented Yemen by MAM
  • 6. Who says we’re leading?  gateProtect is listed in the Gartner Magic Quadrant  Gartner asked to list us in their Magic Quadrant
  • 7. Who else says we’re leading?  gateProtect has been given the Frost & Sullivan Excellence Award “gateProtect provides UTM products that stand-out from the competition due to their ease-of-use and security effectiveness. The gateProtect ergonomic graphical user interface (eGUI) provides the most intuitive and effective visual UTM management interface available in the marketplace.” Frost & Sullivan, August 2011
  • 8. Who else says we’re leading? “The gateProtect is a monster UTM.” “Smoking-hot new firewall” “The Ferrari of firewall appliances”
  • 9. Who else says we’re leading? Our customers, with 40,000 gateProtect installations in Europe
  • 10. gateProtect Next generation Firewalls Large enterprises 10.000 Performance / Throughput (Mbps) GPZ 2500 Enterprises 5.000 GPX 800 GPX 1000 2.000 Medium enterprises GPA 600 GPA 400 1.000 Small enterprises 800 GPA 250 500 Small & remote offices GPO 125 200 GPO75 VPN Acceleration 10 25 50 100 250 500 1.000 5.000 10.000 Users
  • 11. gateProtect Features All features Next Generation Firewall features like gateProtect offersare being incorporated into one central system … a variety of state-of-the-art security Web-Filter & Anti-Virus & Intrusion Prevention Traffic shaping Anti-Phishing Anti-Spyware Instant Messaging Zero-hour Spam Firewall VPN IPSec & SSL Filter (for Skype) Protection
  • 12. gateProtect special Features Seven Multiple Internet Connections - Simultaneous use of up to 7 internet connections for more Internet speed - Failover function, backup line will immedialty take over the connection
  • 13. gateProtect special Features Best Traffic-shaping & bandwith-management in the Market - Maximum and minimum bandwidth can be specified for each user, computer, group etc. & for EACH service - Bandwidth distribution can be configured to any level of detail.
  • 14. gateProtect special Features HTTPS Scan Virus Protection also in HTTPS Traffic - gateProtect scan encrypted HTTPS connections i.e. viruses, trojans, etc. - All HTTPS data flow gets decrypted and analyzed.
  • 15. gateProtect special Features Layer-8 technology - With gateProtect every single user will receive his own detailed rights - All services/ protocolls (65.000) can be broken down to the single user.
  • 16. gateProtect special Features VPN SSL with X.509 certificates - By using gateProtect VPN SSL x.509 much more flexibility is gained - There are no limits, all services can be used (not only HTTP)
  • 17. gateProtect special Features QoS TOS-flags within VPN tunnels - With gateProtect its possible to set flag types (8 Bits) in the VPN Tunnel - That is very important for VoIP or other critical applications like ERP/CRM or onlineshops.
  • 18. The Cause: IT Security Complexity Loop Security threat sophistication increases Response: Result: Increased Increase IT safety complexity/difficulty sophistication Leads to: Higher cost, workload
  • 19. Competitor User Interfaces What could that lead to?
  • 20. Rule-based firewalls escalate human error 98% Rule-based human errors firewalls 2% technical errors Potential for error increases exponentially
  • 21. The solution: gateProtect eGUI Technology gateProtect developed eGUI technology to revolutionize the management interface: Remove human error from the equation
  • 22. eGUI UTM in action: The Demo  Let’s see how eGUI reduces cost, errors, and time…
  • 23. eGUI breaks the complexity loop Security threat sophistication increases Response: Result: Increased Increase IT safety complexity/difficulty sophistication Leads to: Higher cost, workload Break the complexity loop... …by attacking it in three dimensions
  • 24. Reduction of Time via merging Rules
  • 25. Reduction of Error Rate through Visualization
  • 27. gateProtect Command Center For central management of up to 500 gateProtect appliances (small MSSPs or larger customers)  Server-based product  Central control of… – Monitoring/reporting – Backup management – License management – VPN setup – Rollouts
  • 28. Commandcenter in action: The Demo  Let’s see how the Command Center reduces cost, errors, and time…
  • 29. The gateProtect Team: Dedicated to supporting YOU Partnering with Almasa IT Distribution FZCO, Dubai, UAE, 00971-4-3063101 Ongoing R&D 24/7 support hotline Training and certification Valuable marketing tools

Editor's Notes

  1. NOTE TO PRESENTER: After discussing these points, ask: “Isn’t that worth your time?”
  2. NOTE TO PRESENTER: After discussing these points, ask: “Isn’t that worth your time?”