Panda GateDefender Performa 9500 review

Panda has updated its Performa web content security appliances with some much needed improvements. Our live tests show anti-spam performance for the 9500 is exemplary but is this enough to justify the price? Read our review to find out.

Price
£6,400

Panda Security may be best known for its anti-virus software but it's been busy building up an impressive range of security appliances. It has two distinct GateDefender product lines with the Integra family offering full UTM services including SPI firewalling, IPsec VPNs and intrusion prevention.

The Performa appliances are designed to sit behind an existing firewall and provide content security management which includes anti-spam, anti-malware, web filtering plus IM and P2P app controls. In this review we put the enterprise level Performa 9500 through its paces in the lab to see how it measures up.

Two versions of the 9500 are available with the Lite version on review capable of handling up to 18,000 concurrent connections and a 550MB/s throughput for HTTP traffic. The unimaginatively named Large model supports the same number of connections but a slightly higher hardware spec boosts HTTP throughput to 700MB/sec.

The 9500 functions as transparent gateway so it is very easy to deploy. You can ignore the four embedded Gigabit Ethernet ports in the server as Panda has fitted a separate dual-port Gigabit card which incorporates a hardware bypass switch. The bypass means if the appliance dies on you it won't take your Internet connection with it. The 9500 also supports load balancing across a pair of appliances for even greater fault tolerance.

Advertisement
Advertisement - Article continues below

We certainly had no problems deploying the 9500 in the lab as we dropped it between our LAN and WAN with only the briefest of interruptions to Internet services. Panda has redesigned its web management interface which we found very easy to use.

Featured Resources

Application security fallacies and realities

Web application attacks are the most common vulnerability, so what is the truth about application security?

Download now

Your first step researching Managed File Transfer

Advice and expertise on researching the right MFT solution for your business

Download now

The KPIs you should be measuring

How MSPs can measure performance and evaluate their relationships with clients

Download now

Life in the digital workspace

A guide to technology and the changing concept of workspace

Download now
Advertisement

Most Popular

Visit/business-strategy/digital-transformation/354201/boston-dynamics-dog-like-robots-sniff-out-bombs-for
digital transformation

Boston Dynamics dog-like robots sniff out bombs for Massachusetts police

26 Nov 2019
Visit/business-strategy/mergers-and-acquisitions/354191/xerox-threatens-hostile-takeover-after-hp-rebuffs
mergers and acquisitions

Xerox threatens hostile takeover after HP rebuffs $30bn takeover

22 Nov 2019
Visit/security/data-breaches/354192/t-mobile-data-breach-affects-more-than-a-million-users
data breaches

T-Mobile data breach affects more than a million users

25 Nov 2019
Visit/mobile/google-android/354189/samsung-galaxy-a90-5g-review-simply-the-best-value-5g-phone
Google Android

Samsung Galaxy A90 5G review: Simply the best value 5G phone

22 Nov 2019