GPA Series

The gateprotect GPA series has been especially designed for small and medium-sized companies that, besides high requirements as to security and reliability, also value an especially good performance. The comprehensive Unified Threat Management provides for a cost-efficient all-round protection, combined with top performance. The interconnection of branch offices via VPN as well as the use as an endpoint for the connection to further locations may be realized with the GPA series without any problems.

Thanks to its flexibility of use, good performance and the excellent price-performance ratio, the GPA series is the best choice for small and medium-sized companies.

GPA 300

Best solution in performance and reliability at a favorable price

GPA

The gateprotect GPA 300 next generation UTM appliance has been designed for small and medium-sized companies and offices that value reliability and performance. The comprehensive Unified Threat Management of this solution provides for a cost-efficient all-round protection and may be administered quickly and easily thanks to the applied eGUI technology. Powerful security features in the area of anti-virus, Intrusion Prevention, web filter or Application Control offer reliable protection against threats from the Internet. Malware, spam, Trojans, DoS, phishing and other attacks are thus safely defended against. The combination of all defense mechanisms in one device renders costly investments into several separate solutions unnecessary.

The latest hardware is suited for mounting in server cabinets and includes six network interfaces that can be individually configured. Thanks to the high-quality server components, the GPA 300 offers very high transfer rates, assuring comprehensive UTM security combined with high performance even in larger networks.

Likewise, the use of VPN both for the connection of external branches and as an endpoint of a group-wide interconnection of locations may be realized without problems using the GPA 300. Thanks to its flexibility, good performance and the excellent price-performance ratio, the GPA 300 is the best solution for companies and offices that wish to protect their network environments in a comprehensive manner, but at a favorable price.

  • SSL-VPN: Establish a complete VPN via any port
  • Endpoint Security: comprehensive real-time protection of all mobile devices against all threats from the network and the Internet
  • Reporting / Logging: logs all activities at the gateway and offers the possibility to evaluate protocols according to different parameters
  • IDS / IPS: detects and prevents attacks from the outside

GPA 500

Perfect choice for small and medium-sized companies

GPA

The gateprotect GPA 500 next generation UTM appliance has been tailored for medium-sized companies that value, besides high standards of security and reliability, also especially good performance. The comprehensive Unified Threat Management enables cost-efficient all-round protection combined with best performance. Thanks to the application of the eGUI technology, the GPA 500 can be administered quickly and easily. A multitude of up-to-date and powerful security features in the area of anti-virus, Intrusion Prevention or Application Control offer reliable protection against malware, spam, Trojans, DoS, phishing and other attacks. The combination of all defense mechanisms in one device thus renders cost-intensive investments into several separate solutions unnecessary.

The latest hardware is suited for mounting in server cabinets and includes six network interfaces that can be individually configured. The consequent use of high-quality server components in the GPA 500 enables high transfer rates above average, providing for comprehensive UTM security combined with top-performance.

Likewise, the connection of external branches via VPN as well as the use as an endpoint for the connection to further locations may be realized without problems by means of the GPA 500. Thanks to the flexible possibilities of application, the good performance and the excellent price-performance ratio, the GPA 500 is the right choice for small and medium-sized companies that wish to protect their network environment in a reliable matter, but at a favorable price.

  • SSL-VPN: Establish a complete VPN via any port
  • Endpoint Security: comprehensive real-time protection of all mobile devices against all threats from the network and the Internet
  • Reporting / Logging: logs all activities at the gateway and offers the possibility to evaluate protocols according to different parameters
  • IDS / IPS: detects and prevents attacks from the outside

Related List

Latest News

Bandwidth Management

An essential success factor for smooth business operations is the optimal allocation of bandwidth within a network. Short response times and unrestricted access to important services save resources, time and money.

The classification of data flows within a network may take place based on IP addresses, the network protocol or the type of service (TOS) in the IP header. If the IT administrator sets up a prioritization for the right business-relevant data flows, the availability of such data flows is increased. Certain applications can be used at a higher speed. Thanks to Application Control, the access to certain services that consume much bandwidth such as Skype or video streaming may be blocked for certain user groups.

  • Load Balancing: allocates the network traffic to several lines depending on the type of connection and goal
  • Traffic Shaping / Quality of Service: prioritizes services at the gateway and assures the availability of applications

Data Protection

Your data are valuable. For companies, protecting them from targeted attacks from the outside and from accidental loss caused by their own employees is nowadays one of the most important requirements with respect to IT security. The loss of customer or product data may cause long-term damage to the reputation of a company and destroy the result of years of cost-intensive research and development work.

Especially when data are raised and stored at several locations or several persons have access to confidential information, a safely encrypted connection between locations (Site to Site) or between users and companies (Client to Site) is indispensable. Likewise, the connection and protection of mobile devices as well as the effective monitoring at all access gateways for employees' own devices are a must for comprehensive data security. Only this way, phishing mails and other types of targeted industrial espionage can be fought effectively - and the security of personal data can be assured.

Since data are not only exchanged via email or FTP, but also via web browsers or apps, it is important to install a gateprotect security solution that not only blocks ports, but also recognizes and prioritizes applications and blocks them in a targeted manner if necessary.

  • Application Control: restricts the access to unwelcome applications entirely or partly
  • Secure VPN Connection: protects the connection to branch offices and mobile devices to the company network (IPSec or VPN SSL support. Site to Site or Client to Site support)
  • Reporting / Logging: logs all activities at the gateway and offers the possibility to evaluate protocols according to different parameters
  • Endpoint Security: comprehensive real-time protection of all mobile devices against all threats from the network and the Internet

Email Protection

Nowadays, email is the main communication channel in the world of business. This is also known to potential hackers. They exploit the carelessness of many users in order to gain access to personal data via phishing mails, infiltrate viruses, Trojans and other malware by means of manipulated attachments and spy on companies.

With gateprotect email protection, electronic mail is checked for undesired, malicious contents before it reaches the inbox. The detection is done quickly and reliably without any impact on the user. gateprotect's cloud-assisted email protection is always up-to-date - even if you are not online or outside the company network. Access to suspicious contents is reliably blocked.

The sophisticated spam protection of the gateprotect firewalls detects undesired mass emails from unknown senders. The flood of unwanted emails is reliably reduced without compromising the network performance. gateprotectdefense is always up-to-date and is immediately enhanced effectively whenever new threats occur. Thus, it is also prevented that your company computers are abused for the distribution of spam.

Thanks to the reporting and logging functions of the gateprotect firewall, IT administrators may at any time quickly view a clear display of the incidents at the gateway and react in an instant. The evaluation on suspicious emails and the overall traffic provides for a comprehensive overview. The possibility of short-term and long-term assessments further supports the dynamic protection of the network.

  • Antivirus: effective protection against viruses without compromising the network performance
  • Anti Spam: cloud-based protection against undesired emails, always up-to-date and secure
  • Reporting / Logging: logs all activities at the gateway and offers the possibility to evaluate protocols according to different parameters

Endpoint Security

Today, companies are facing new challenges with respect to the protection of the IT infrastructure. Complex and targeted threats such as advanced persistent threats (APT) and phishing attacks are occurring more and more frequently. Sensitive company data on mobile devices must be protected in real time even if the employees are located outside the company firewall.

With "Complete Security", gateprotect delivers an innovative endpoint solution, providing for all-round protection for networks and endpoints as well as reliable data security anywhere and at any time. Also for the protection of mobile devices, gateprotect is continuously focusing on user-friendliness and easy operation. gateprotect+Webroot Complete Security is perfectly continuing the "easy-to-use" approach pursued by the eGUI technology. The solution may be installed easily and without problems, requires less memory and computing power and incorporates excellent security management functions so that a great number of computers and servers can be administered.

gateprotect+Webroot Complete Security offers an innovative approach for the protection of all terminals against malware. The state-of-the-art file pattern and behavior detection technology works especially effectively since it uses the nearly unlimited possibilities of cloud computing for the defense against threats and the prevention of unknown zero day attacks. The client scans are done especially quickly so that users' working processes are not inhibited and can continue without any restriction.

Even users not connected to the network are protected against current threats. The easy-to-administer, separate control of user guidelines allows managing the use of terminals offline and furthermore offers the possibility to block connections and devices such as USB sticks and CD/DVD drives.

  • Endpoint Protection with ultimate performance: Installation in less than 6 secons and Scans in less than one minute
  • Minimum Efforts: No updates or patches, no re-imaging required

Stopping Malware

Malware attacks are occurring more and more frequently and have become more and more complex. They come from a great variety of sources, at any time. Invaders use keyloggers, Trojans and Phishing mails, they infiltrate malware via websites, emails or download links on the web in order to gain access to company data and use them for earning money.

To protect the entire company IT against all these dangers, you need the best possible combination of several defense mechanisms. Anti-virus, anti-Spam, URL and content filters must work together perfectly and need to be updated as regularly as IPS signatures and HTTPS scans that detect and block damaged, encrypted traffic. And: The protection system must work perfectly without compromising the performance of the firewall, data availability and the working processes of your employees.

Your gateprotect firewall reliably recognizes attacks from different sources and blocks them quickly, regardless whether the danger comes from defective downloads of employees or employees' own devices. Before malware enters your network from the outside or malicious emails reach your inbox, the comprehensive gateprotectdefense has already done its job.

Via the attack reporting, an important overview of weak points is delivered in an instant. An effective way to implement the compliance strategy in the company. Thanks to the user-friendly eGUI technology, the access gateway for aggressors is quickly locked by a few clicks, also for future attacks.

  • IDS / IPS: detects and prevents attacks from the outside
  • Anti-virus: effective protection against viruses
  • Anti-Spam: effective protection against undesired emails, always up-to-date and secure
  • URL and Content Filter: blocks unapproved web sites and contents
  • Reporting / Logging: logs all activities at the gateway and offers the possibility to evaluate protocols according to different parameters
  • Https Scan: scans contents for malware or other malicious content in encrypted traffic.

Administration of Rights & Access Control

Online-based business procedures are determining today's working life: Payment transactions, inventory control systems and communication channels are digitally interconnected with each other. For the protection against malware and industrial espionage, IT administrators have to define carefully in their security strategy which users may access certain systems. It also has to be determined whether users (or user groups) may use certain sources in distributed network architectures and from where users may log in. A determined administration of rights and access control minimizes the probability that sensitive company data leave the company and reach the hands of third parties - whether due to carelessness or deliberate act of employees. Thus, also the possibilities of access for external data spies are reduced. A decisive contribution to optimized data security and an important step towards the implementation of a company's compliance strategy.

A multitude of modern security features helps administrators to effectively manage the administration of rights and access control of the gateprotect next generation firewall appliances.

A connection to existing user directories allows to grant or block rights for certain users or user groups easily by a mouse click. The application of Single Sign On assures that users may access many documents and services after a one-time authentication at the workplace without having to log in again and again.

  • URL and Content Filter: blocks unwelcome websites and contents
  • Application Control: restricts the access to unwelcome applications entirely or partly
  • User Authentication: transparent guideline management based on user log-in for users or groups
  • Secure VPN Connection: Protects the connection of branch offices and mobile devices to the company network (IPSec or VPN SSL support. Site to Site or Client to Site support)

Secure Connection via VPN

Fast and secure connection to a company network

Thanks to VPN, staff members in the home office or travelling may access sensitive company data in the network as if they were in the office - safe from eavesdropping and manipulation. In addition, companies have the possibility of safely interconnecting the local networks of several locations.

gateprotect offers the most commonly used forms of current site-to-site and Road Warrior VPN connections via IPSec and SSL. Wizards and the eGUI® technology help with the management and set-up of these connections. In addition, the firewall generates external configuration files when the VPN connections are created. These files can be used for setting up single click connections and also for site-to-site connections when importing on the firewall at a remote site.

Furthermore, gateprotect offers an IPSec and SSL site-to-site solution with X.509 certificates which can work in bridge mode as an option. For a normal bridge, two or more network cards are linked to form a logical network. gateprotect not only allows this for network cards but also for VPN-over-SSL connections. This makes it possible to treat remote computers as if they were in the local network.

  • gateprotect offers extensive VPN features for the fast and secure connection to a company network.

Secure Internet Use

Office and B-2-B communication without using the Internet has become unthinkable nowadays. Many companies use web-based applications, communicate in social networks, via micro-blogging, stream multi-media contents and act in the "Cloud". It is not unusual, whether allowed by guidelines or not, that private and business-related online traffic overlap. Especially social networks like Facebook, Twitter or YouTube offer an ideal gateway for cyber-attacks.

The phishing attempts with elaborately placed links from seemingly reliable sources, hashtags, advertisements, pictures and photos that have been exploited for the transfer of malware are becoming more and more targeted and complex.

To stop malware, enforce compliance guidelines and to prevent unproductivity, it is no longer enough to filter data based on ports and protocols. IT administrators have to use much more granular approaches and manage settings on the level of applications.

With gateprotect security functions like Application Control, the applications used in companies can be protocoled and analyzed. The Internet use can be adjusted to the requirements of individual divisions of a company. By blocking certain applications, bandwidth can be optimally exploited - and the access gateways for malware and spying attacks are reduced.

  • URL and Content Filter: blocks unwelcome websites and contents
  • Application Control: restricts the access to unwelcome applications entirely or partly
  • Reporting / Logging: logs all activities at the gateway and offers the possibility to evaluate protocols according to different parameters

Related List

Latest News

GPA300

GPA 500

Interfaces
GBE Ports: 5 6
System Performance*
Concurrent sessions: 1000000
New sessions pr. Second: 7000
IDS/IPS throughput (Mbps) 0 0
UTM throughput (Mbps) 300 400
VPN IPSec throughput (Mbps) 250 320
Firewall throughput (Mbps): 1900 2100
Dimensions
H x W x D (mms) 44 x 426 x 238 44 x 426 x 238
Gross Weights (kgs): 3.00 3.00
Power
Input Voltage (V): AC 100V-240V AC 100V-240V
Consumption (W) - full load / rating: 41 41
Environmental
Operating Temperature (°C): 0 ~ 40 0 ~ 40
Storage Temperature (°C): -10 ~ 70 -10 ~ 70
Relative Humidity (Non condensing): 20 ~ 90% 20 ~ 90%

Related List

Latest News