Attacks/Breaches
11/19/2012
11:27 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Panda Security Launches New Panda GateDefender Performa eSeries

eSeries is a new line of integrated perimeter security appliances designed for midsize and large companies

Panda Security, The Cloud Security Company, today announced the launch of Panda GateDefender Performa eSeries, its new, unified perimeter security device that protects against all types of threats. Panda Security's new appliance enables mid-size and large companies (50 users or more) to protect their corporate network and increase their productivity.

The solution is available in three different versions: compatible with virtualization engines, software only, and five different hardware models designed for organizations of every size. In addition, its new Panda Perimetral Management Console allows centralized and secure management and configuration of all appliances on the network from a single location, accessible from the cloud at any time. The solution is available at http://www.pandasecurity.com/enterprise/solutions/gatedefender-performa/

Image available at http://prensa.pandasecurity.com/wp-content/uploads/2012/11/PERFORMA.jpg

Main benefits of Panda GateDefender Performa eSeries include:

· Flexible, cloud-based management to centrally monitor, manage and update appliances quickly and easily, anywhere, anytime.

· Increased user productivity and optimized resource usage thanks to spam neutralization, restricted access to unproductive content and services, and bandwidth usage control.

· Complete protection against all types of infections and intrusion attempts right from the start. Faster response to new malware threats via automatic updates and queries to the cloud.

· High Internet availability and its routing policies allow configuration of multiple high-availability lines, as well as installation of multiple appliances in parallel to deliver fault-tolerant, secure connectivity.

· Flexible, seamless integration with existing IT infrastructures thanks to the wide range of available versions: hardware, virtual and software appliances.

The new Panda GateDefender Performa eSeries manages companies' perimeter security needs by neutralizing viruses, spam and unauthorized access at the Internet gateway through a complete set of resources which leverage Collective Intelligence technologies. Its main features include:

· Firewall: Ensures that inbound and outbound communications comply with the security policy.

· Intrusion Prevention System (IPS): Prevents intrusion attacks.

· Antimalware: Protects against all types of malicious software in email and Web traffic.

· Content filter: Scans inbound and outbound traffic for dangerous content.

· Antispam: Keeps email traffic free from junk mail.

· Web filter: Restricts access to non-work-related Web content.

· Multiple connection technologies to access the Internet and the corporate network. Compatible with ADSL/UMTS/GPRS/3G/USB devices.

· VPN: Secure communication with remote offices and roaming workers with mobile devices.

· HotSpot: Grants controlled temporary Internet access to guests or visitors to the company.

· QOS: Minimizes unproductive and ineffective usage of precious network bandwidth.

For more information about Panda GateDefender Performa eSeries, please visit http://www.pandasecurity.com/enterprise/solutions/gatedefender-performa/.

About Panda Security

Founded in 1990, Panda Security is the world's leading provider of cloud-based security solutions, with products available in more than 23 languages and millions of users located in 195 countries around the World. Panda Security was the first IT security company to harness the power of cloud computing with its Collective Intelligence technology. This innovative security model can automatically analyze and classify thousands of new malware samples every day, guaranteeing corporate customers and home users the most effective protection against Internet threats with minimum impact on system performance. Panda Security has 56 offices throughout the globe with US headquarters in Florida and European headquarters in Spain.

Panda Security collaborates with Special Olympics, WWF and Invest for Children as part of its Corporate Social Responsibility policy.

For more information, visit http://www.pandasecurity.com/ or our press site http://press.pandasecurity.com/.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6117
Published: 2014-07-11
Dahua DVR 2.608.0000.0 and 2.608.GV00.0 allows remote attackers to bypass authentication and obtain sensitive information including user credentials, change user passwords, clear log files, and perform other actions via a request to TCP port 37777.

CVE-2014-0174
Published: 2014-07-11
Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.

CVE-2014-3485
Published: 2014-07-11
The REST API in the ovirt-engine in oVirt, as used in Red Hat Enterprise Virtualization (rhevm) 3.4, allows remote authenticated users to read arbitrary files and have other unspecified impact via unknown vectors, related to an XML External Entity (XXE) issue.

CVE-2014-3499
Published: 2014-07-11
Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.

CVE-2014-3503
Published: 2014-07-11
Apache Syncope 1.1.x before 1.1.8 uses weak random values to generate passwords, which makes it easier for remote attackers to guess the password via a brute force attack.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.