The name of the base system (platform): | Panda GateDefender |
Developers: | Panda Security |
Last Release Date: | May, 2011 |
Technology: | Cloud Computing, Virtualization, cybersecurity - Antiviruses, cybersecurity - the Antispam, the Firewall |
The Panda Security company began since May, 2011 sales of the new virtual cloud solution for defense of perimeter of Panda Virtual GateDefender Performa network. The new virtual solution reliably protects perimeter of network from malware, spam and undesirable web content. The solution is effectively integrated in virtual environment of the companies of any size – from 50 to 10,000 employees above.
Panda Virtual GateDefender Performa offers protection against all types of Internet threats and spam. The solution blocks not belonging to work or potentially dangerous web activity, using "a hybrid cloud" on perimeter of network and also increasing potential in the field of protection and considerably reducing use of resources.
"The hybrid cloud" which is used in the new virtual device combines the "private cloud" placed in corporate network of the enterprise and ensuring functioning of Panda GateDefender Performa, and "a public cloud" (Collective intelligence) which provides services of a global network and to a "private" cloud.
Thus, users use the potential of complete volume of knowledge from "cloud", thanks to the permanent connection in real time to Collective intelligence – a system which automatically detects, analyzes, classifies and detects 99.4% from 73000 new samples of the malicious software received by PandaLabs laboratory daily.
Use of "a hybrid cloud" became a huge step forward in the field of security of perimeter of network as such approach provides to the company full control over the data, including files of magazines and registers which are protected in much smaller degree without use of this function. It means that data do not go to "cloud" for the analysis, except for some cases with the high level of enciphering.
Panda Virtual GateDefender Performa is the only SCM device (safe content management) which answers the operational purpose of the virtualized systems: expense efficiency, consolidation of applications and ease of use.
Main characteristics of the solution:
- The integrated pro-active protection. The combination of Collective intelligence, cloud computing, heuristics and a quarantine allow to optimize detection of threats
- Security blanket. Protection, best in the class, against potentially dangerous content, spam and unproductive web content. Function of restriction of such protocols as P2P/IM/VoIP/Spotify is available.
- Detection of the zombie. Contains the highly specialized module for detection and disinfection of bots in corporate networks: both on separate computers, and on mail servers.
- Automatic protection. Provides continuous and transparent updating of signatures and technologies in real time, guaranteeing effective operation of the virtual device without intervention from user side.
- Integration with LDAP/Active Directory. Guarantees respect for the principles of security policy at creation of risk groups, network users, etc.
- High scalability. Function of balancing of loading provides the maximum availability.
- Quality of service (Quality of Service, QoS). Bandwidth control for providing optimal network performance.
- The configured warnings. Extend through SMTP, SNMP and Syslog
- Clear reports of security. Help to conform to security requirements.
- Monitoring system in real time. The management console provides graphic reports for work of each module of protection in real time.
- Friendly in relation to the user and the intuitive web console. It is available in any place at any time.