contact us

 

 

 

 

Network Security

Mircosoft ISA Netscreen

Appliances - Out of the box solution  

Gate Defender Integra - Your all in one protection

GateDefender Inegra


Promenu
The only security appliance providing all seven critical layers of protection.

The GateDefender Integra sits between the corporate network and the Internet to provide protection against all types of threats. It provides seven layers of protection in a single device: Firewall, Intrusion Prevention System (IPS), VPN, Anti-malware, Content Filter, Anti-spam, and Web Filtering.

The GateDefender Integra uses both reactive and proactive security techniques to ensure solid protection against new or unknown threats. Because the GateDefender Integra stops attackers at the gateway, the efficiency of the rest of your network and the productivity of desktop users is enhanced.

GateDefender Integra's clean, intuitive Web-based remote administration console makes it easy to set up, configure, and manage all layers of protection from any location. The automatic-update function refreshes critical signature files every 90 minutes. Using high-performance processors, the GateDefender Integra delivers very fast response and high throughput resulting in minimum impact on corporate networks.

Integra's goal is to provide complete protection against all known and unknown threats in one unified device with a single interface so that network administrators can know with certainty their system are safe without having to pay constant attention to a diverse set of applications.

Administrators can choose from two models of the GateDefender Integra to meet the needs of small and medium enterprises or Branch Offices:

  • Panda GateDefender Integra 100, for up to 100 users.
  • Panda GateDefender Integra 300, for up to 250 users.

Schedule your fee evaluation unit today! (Ѵѹ) 0-2719-5201-2 or e-mail sales@itdatacom.co.th <- click here

Tech SpecTechnical specifications.

GateDefender Integra100 GateDefenderIntegra300
Administration and configuration Secure (HTTPS) and intuitive web interface through any browser. Configurable remote access. Secure (HTTPS) and intuitive web interface through any browser. Configurable remote access.
Installation and integration on the network Directly in transparent bridge mode. It requires configuration for router mode and provides installation wizards to simplify this task.. Directly in transparent bridge mode. It requires configuration for router mode and provides installation wizards to simplify this task.
Updates of products and signature files Automatic with no need for user intervention. Automatic with no need for user intervention.
Protocols scanned Up to six protocols scanned inbound and outbound: HTTP (including Java and ActiveX), FTP, SMTP, POP3, IMAP4 and NNTP. Up to six protocols scanned inbound and outbound: HTTP (including Java and ActiveX), FTP, SMTP, POP3, IMAP4 and NNTP.
Attacks/intrusions detected +4500 +4500
VPN protocols SSL, IPSec, PPTPand L2TP. SSL, IPSec, PPTPand L2TP.
No. VPN connections Unlimited Unlimited
Firewall performance 330 Mbps 850 Mbps
Concurrent connections 350.000 550.000
SMTP scan 80messages per second 160 messages per second
HTTP scan 40 Mbps 80 Mbps
Reports and warnings Sending of customizable warnings and notifications about protection activity. Detailed reports. Sending of customizable warnings and notifications about protection activity. Detailed reports.
Network connection (4) 10/100/1000 Eth-RJ-45. (8) 10/100/1000 Eth-RJ-45.
Microprocessor Pentium IV 2 GHz. Pentium IV 3.4 GHz.
RAM 512 MB. 1 GB.
Harddisk 40 GB 80 GB
Dimensions in inches 13.8 x 9.7 x 3. 16.9 x 1.7 x 15
Dimensions in millimeters 350 x 76.6 x 246. 429 x 44 x 382.
Certifications FFCandCE. FFCy CE


Top Layer Intrusion Prevention System Products:
Data Sheet

  • Protection against malicious content through advanced IPS technology
  • Protection against undesired access through stateful firewall filtering
  • Protection against rate-based attacks such as DDoS attacks through DDoS mitigation


  • High Performance = The highest throughput and leading stateful session setup rates ensure excellent network performance.
  • Lowest Network Latency = At <50 uSec there's no interruption to critical applications like VoIP.
  • Reliability and High Availability = ProtectionCluster H/A configurations, port bypass and redundant power all ensure reliability.
  • Easy to Deploy and Manage = It can be deployed and protecting a network within 30 minutes.
    Multiple units can be easily managed with Top Layer's Secure Command+ centralized management system.
  • Stays current on emerging threats = TopResponse? Update Service's Automated Protection Pack updates keep threat

Protect Your Confidential Business Information:

For enterprises with wireless LAN networks,as well as those without, Wi-Fi brings a new set of security threats that cannot be protected against by your current firewall and VPN security systems. Insecure deployments of Wi-Fi Access Points (APs) called Rogue APs, often done without malice by your own employees, can open up your network to potential hackers exposing confidential information about your business, customers, products and services. Client mis-associations may lead to additional vulnerabilities. The SpectraGuard Enterprise Wi-Fi IPS solves these problems by delivering the same comprehensive protection as a wired firewall, but focused on your corporate airwaves.

  • Automatically identify and prevent security risks and attacks
  • Provide real-time network audits
  • Assist in performance troubleshooting
  • Monitor the overall health of the wireless LAN
  • Dual wired-side and over-the-air prevention through integration with Cisco Systems Wireless LAN
    Solutions Engine

 

 

 

 

IMAuditor


IMAuditor is the leading enterprise-class solution for the security and compliance management and control of instant messaging and other real-time communication applications. The growing use of both public and enterprise IM applications in the enterprise is causing challenges from inbound and outbound threats that can result in security breaches, productivity loss and information leakage. In addition, regulatory compliance requirements for electronic communications are becoming more stringent requiring organizations to log, archive and audit all electronic communications, including IM and chat content. IMAuditor empowers organizations to effectively manage real-time communications, enabling users to make productive use of these applications without creating additional information security risks. It supports all public and enterprise IM clients, as well as industry-focused IM communities such as Reuters Messaging, and Web conferencing application such as WebEx. Deployed behind the firewall, it provides a single enterprise-wide IM management solution that gives IT visibility into and control over all real-time communications through a single interface.  
 
   Copyright©2005 IT DATACOM . All right reserved.
   1350/200-201Ҥç 12 .Ѳҡ ǧǹǧ ࢵǹǧ ا෾ 10250
   Tel.02-7195201-2 Fax.02-7195100 # 200