Panda GateDefender Performa 9100 review
Panda latest appliance delivers web content security at the network perimeter. The anti-spam measures are near perfect but are its other features as good?
It may be best known for its anti-virus software products but Panda moved into the security appliance market a number of years ago and now offers an extensive range of hardware solutions. The GateDefender Performa family focuses on delivering web content security at the network perimeter and the latest 9100 now adds controls for IM and P2P apps to its anti-spam, anti-malware and web content filtering features.
As the 9100 functions as a transparent gateway it's a cinch to deploy. We popped it in between our LAN and firewall enabling it to scan inbound and outbound HTTP, FTP, SMTP, POP3 and NNTP protocols without any need to reconfigure our network clients.
The appliance comes as standard with a dual-port Gigabit card which has a hardware bypass circuit, so if the system goes belly-up it won't take all internet access with it. For greater fault tolerance it also supports load balancing across a pair of appliances.
The 9100 is the second in a family of four Performa appliances and is designed to handle up to 500Mbps of web traffic and 220 messages per second. The hardware platform looks up to the job as Panda has opted to use a decent Sun Fire X2100 1U rack server equipped with a 2.8GHz dual-core Opteron and 4GB of DDR2 memory.
The anti-spam module provides a good range of options for handling suspect emails.
The management web interface is a smart affair that provides easy access to all the features. You have two layers of security as the appliance enforces policy based security settings first followed by global settings for each security module.
To use policies you start by creating network definitions, which describe IP addresses, ranges or subnets, LDAP servers, users and domains. You then access the settings management page where you define custom configurations for the anti-malware, web content filter, URL filter and anti-spam modules.
In This Article
The essential guide to cloud-based backup and disaster recovery
Support business continuity by building a holistic emergency planDownload now
Trends in modern data protection
A comprehensive view of the data protection landscapeDownload now
How do vulnerabilities get into software?
90% of security incidents result from exploits against defects in softwareDownload now
Delivering the future of work - now
The CIO’s guide to building the unified digital workspace for today’s hybrid and multi-cloud strategies.Download now