GPO Series

The gateprotect GPO series serves as an entry-level solution for Unified Threat management and allows for cost-efficient complete protection for lawyers' offices, medical practices, small companies and offices. The current hardware includes four network interfaces that can be individually configured and assures high transfer rates so that comprehensive UTM security is provided even for several users.

The GPO series is also very suitable as an endpoint for the secure interconnection (via VPN) to a network protected by a gateprotect next generation firewall.

GPO 100

Perfect solution for small office environments

GPO

The gateprotect GPO 100 firewall as an entry-level version has been especially designed for the needs of offices, small companies and branch offices as well as home offices. Thanks to the applied eGUI technology and a multitude of state-of-the-art security features, a user-friendly basic protection can thus be assured. The latest hardware includes four network interfaces that can be individually configured and is excellently suited as an endpoint for the secure connection (via VPN) to a network protected by a gateprotect next generation firewall. The set-up and connection via VPN is absolutely simple-one click is all it takes. Thanks to its compact size and favorable price, the GPO 100 is the perfect solution for small office environments.

Using a gateprotect W-LAN-module the GPO 100 can be extended to a W-LAN-Access Point.

  • Traffic Shaping / Quality of Service: prioritizes services at the gateway and assures the availability of applications
  • Fully encrypted config./ certificate files: easy establishing of a VPN-Connection between a gateprotect VPN-Client and Firewall
  • Endpoint Protection with ultimate performance: Installation in less than 6 secons and Scans in less than one minute

GPO 110

The entry-level solution for the Unified Threat Management segment

GPO

The gateprotect GPO 110 Next Generation UTM solution is the entry-level solution for the Unified Threat Management segment and thus especially addresses the security needs of small companies and offices. However, it has also been designed for lawyers' offices or medical practices where particularly sensitive data need to be protected. Thanks to the deployment of the eGUI technology and state-of-the-art security features, the GPO 110 offers comprehensive protection against malware, spam, Trojans, phishing and other attacks.

The current hardware is equipped with four Gbit/s connections and high transfer rates so that it offers all-round UTM security for several users. At the same time, the GPO 110 is excellently suited as an endpoint for the secure connection (via VPN) to a network protected by a gateprotect Next Generation Firewall. The set-up and connection via VPN could not be easier.

Thanks to its compact dimensions and the favorable price, the GPO 110 is the optimal solution for small companies, office and individual subsidiaries even with special security needs that are looking for a competitively priced, but effective basic protection for their networks. Using a gateprotect W-LAN-module the GPO 110 can be extended to a W-LAN-Access Point.

GPO 150

Entry-level product for Unified Threat Management

GPO

The gateprotect GPO 150 next generation UTM solution is the entry-level product for Unified Threat Management and thus enables the competitively priced all-round protection for lawyers' offices, medical practices, small companies and offices. Thanks to the applied eGUI technology and a powerful protection against malware, spam, Trojans, phishing and other attacks, comprehensive security of the network is achieved. The latest hardware includes four network interfaces that can be individually configured and enables high transfer rates so that comprehensive UTM security is assured even for several users. Likewise, the GPO 150 is perfectly suited as an endpoint for the secure connection (via VPN) to a network protected by a gateprotect next generation firewall. The set-up and connection via VPN is absolutely simple - one click is all it takes. Thanks to its compact size and favorable price, the GPO 150 is the ideal solution for small companies and offices that do not want to forgo comprehensive IT security even though budgets are low.

Using a gateprotect W-LAN-module the GPO 150 can be extended to a W-LAN-Access Point.

  • SSL-VPN: Establish a complete VPN via any port
  • Endpoint Security: comprehensive real-time protection of all mobile devices against all threats from the network and the Internet
  • Reporting / Logging: logs all activities at the gateway and offers the possibility to evaluate protocols according to different parameters
  • IDS / IPS: detects and prevents attacks from the outside

Related List

Latest News

Bandwidth Management

An essential success factor for smooth business operations is the optimal allocation of bandwidth within a network. Short response times and unrestricted access to important services save resources, time and money.

The classification of data flows within a network may take place based on IP addresses, the network protocol or the type of service (TOS) in the IP header. If the IT administrator sets up a prioritization for the right business-relevant data flows, the availability of such data flows is increased. Certain applications can be used at a higher speed. Thanks to Application Control, the access to certain services that consume much bandwidth such as Skype or video streaming may be blocked for certain user groups.

  • Load Balancing: allocates the network traffic to several lines depending on the type of connection and goal
  • Traffic Shaping / Quality of Service: prioritizes services at the gateway and assures the availability of applications

Data Protection

Your data are valuable. For companies, protecting them from targeted attacks from the outside and from accidental loss caused by their own employees is nowadays one of the most important requirements with respect to IT security. The loss of customer or product data may cause long-term damage to the reputation of a company and destroy the result of years of cost-intensive research and development work.

Especially when data are raised and stored at several locations or several persons have access to confidential information, a safely encrypted connection between locations (Site to Site) or between users and companies (Client to Site) is indispensable. Likewise, the connection and protection of mobile devices as well as the effective monitoring at all access gateways for employees' own devices are a must for comprehensive data security. Only this way, phishing mails and other types of targeted industrial espionage can be fought effectively - and the security of personal data can be assured.

Since data are not only exchanged via email or FTP, but also via web browsers or apps, it is important to install a gateprotect security solution that not only blocks ports, but also recognizes and prioritizes applications and blocks them in a targeted manner if necessary.

  • Application Control: restricts the access to unwelcome applications entirely or partly
  • Secure VPN Connection: protects the connection to branch offices and mobile devices to the company network (IPSec or VPN SSL support. Site to Site or Client to Site support)
  • Reporting / Logging: logs all activities at the gateway and offers the possibility to evaluate protocols according to different parameters
  • Endpoint Security: comprehensive real-time protection of all mobile devices against all threats from the network and the Internet

Email Protection

Nowadays, email is the main communication channel in the world of business. This is also known to potential hackers. They exploit the carelessness of many users in order to gain access to personal data via phishing mails, infiltrate viruses, Trojans and other malware by means of manipulated attachments and spy on companies.

With gateprotect email protection, electronic mail is checked for undesired, malicious contents before it reaches the inbox. The detection is done quickly and reliably without any impact on the user. gateprotect's cloud-assisted email protection is always up-to-date - even if you are not online or outside the company network. Access to suspicious contents is reliably blocked.

The sophisticated spam protection of the gateprotect firewalls detects undesired mass emails from unknown senders. The flood of unwanted emails is reliably reduced without compromising the network performance. gateprotectdefense is always up-to-date and is immediately enhanced effectively whenever new threats occur. Thus, it is also prevented that your company computers are abused for the distribution of spam.

Thanks to the reporting and logging functions of the gateprotect firewall, IT administrators may at any time quickly view a clear display of the incidents at the gateway and react in an instant. The evaluation on suspicious emails and the overall traffic provides for a comprehensive overview. The possibility of short-term and long-term assessments further supports the dynamic protection of the network.

  • Antivirus: effective protection against viruses without compromising the network performance
  • Anti Spam: cloud-based protection against undesired emails, always up-to-date and secure
  • Reporting / Logging: logs all activities at the gateway and offers the possibility to evaluate protocols according to different parameters

Endpoint Security

Today, companies are facing new challenges with respect to the protection of the IT infrastructure. Complex and targeted threats such as advanced persistent threats (APT) and phishing attacks are occurring more and more frequently. Sensitive company data on mobile devices must be protected in real time even if the employees are located outside the company firewall.

With "Complete Security", gateprotect delivers an innovative endpoint solution, providing for all-round protection for networks and endpoints as well as reliable data security anywhere and at any time. Also for the protection of mobile devices, gateprotect is continuously focusing on user-friendliness and easy operation. gateprotect+Webroot Complete Security is perfectly continuing the "easy-to-use" approach pursued by the eGUI technology. The solution may be installed easily and without problems, requires less memory and computing power and incorporates excellent security management functions so that a great number of computers and servers can be administered.

gateprotect+Webroot Complete Security offers an innovative approach for the protection of all terminals against malware. The state-of-the-art file pattern and behavior detection technology works especially effectively since it uses the nearly unlimited possibilities of cloud computing for the defense against threats and the prevention of unknown zero day attacks. The client scans are done especially quickly so that users' working processes are not inhibited and can continue without any restriction.

Even users not connected to the network are protected against current threats. The easy-to-administer, separate control of user guidelines allows managing the use of terminals offline and furthermore offers the possibility to block connections and devices such as USB sticks and CD/DVD drives.

  • Endpoint Protection with ultimate performance: Installation in less than 6 secons and Scans in less than one minute
  • Minimum Efforts: No updates or patches, no re-imaging required

Stopping Malware

Malware attacks are occurring more and more frequently and have become more and more complex. They come from a great variety of sources, at any time. Invaders use keyloggers, Trojans and Phishing mails, they infiltrate malware via websites, emails or download links on the web in order to gain access to company data and use them for earning money.

To protect the entire company IT against all these dangers, you need the best possible combination of several defense mechanisms. Anti-virus, anti-Spam, URL and content filters must work together perfectly and need to be updated as regularly as IPS signatures and HTTPS scans that detect and block damaged, encrypted traffic. And: The protection system must work perfectly without compromising the performance of the firewall, data availability and the working processes of your employees.

Your gateprotect firewall reliably recognizes attacks from different sources and blocks them quickly, regardless whether the danger comes from defective downloads of employees or employees' own devices. Before malware enters your network from the outside or malicious emails reach your inbox, the comprehensive gateprotectdefense has already done its job.

Via the attack reporting, an important overview of weak points is delivered in an instant. An effective way to implement the compliance strategy in the company. Thanks to the user-friendly eGUI technology, the access gateway for aggressors is quickly locked by a few clicks, also for future attacks.

  • IDS / IPS: detects and prevents attacks from the outside
  • Anti-virus: effective protection against viruses
  • Anti-Spam: effective protection against undesired emails, always up-to-date and secure
  • URL and Content Filter: blocks unapproved web sites and contents
  • Reporting / Logging: logs all activities at the gateway and offers the possibility to evaluate protocols according to different parameters
  • Https Scan: scans contents for malware or other malicious content in encrypted traffic.

Administration of Rights & Access Control

Online-based business procedures are determining today's working life: Payment transactions, inventory control systems and communication channels are digitally interconnected with each other. For the protection against malware and industrial espionage, IT administrators have to define carefully in their security strategy which users may access certain systems. It also has to be determined whether users (or user groups) may use certain sources in distributed network architectures and from where users may log in. A determined administration of rights and access control minimizes the probability that sensitive company data leave the company and reach the hands of third parties - whether due to carelessness or deliberate act of employees. Thus, also the possibilities of access for external data spies are reduced. A decisive contribution to optimized data security and an important step towards the implementation of a company's compliance strategy.

A multitude of modern security features helps administrators to effectively manage the administration of rights and access control of the gateprotect next generation firewall appliances.

A connection to existing user directories allows to grant or block rights for certain users or user groups easily by a mouse click. The application of Single Sign On assures that users may access many documents and services after a one-time authentication at the workplace without having to log in again and again.

  • URL and Content Filter: blocks unwelcome websites and contents
  • Application Control: restricts the access to unwelcome applications entirely or partly
  • User Authentication: transparent guideline management based on user log-in for users or groups
  • Secure VPN Connection: Protects the connection of branch offices and mobile devices to the company network (IPSec or VPN SSL support. Site to Site or Client to Site support)

Secure Connection via VPN

Online-based business procedures are determining today's working life: Payment transactions, inventory control systems and communication channels are digitally interconnected with each other. For the protection against malware and industrial espionage, IT administrators have to define carefully in their security strategy which users may access certain systems. It also has to be determined whether users (or user groups) may use certain sources in distributed network architectures and from where users may log in. A determined administration of rights and access control minimizes the probability that sensitive company data leave the company and reach the hands of third parties - whether due to carelessness or deliberate act of employees. Thus, also the possibilities of access for external data spies are reduced. A decisive contribution to optimized data security and an important step towards the implementation of a company's compliance strategy.

A multitude of modern security features helps administrators to effectively manage the administration of rights and access control of the gateprotect next generation firewall appliances.

A connection to existing user directories allows to grant or block rights for certain users or user groups easily by a mouse click. The application of Single Sign On assures that users may access many documents and services after a one-time authentication at the workplace without having to log in again and again.

  • URL and Content Filter: blocks unwelcome websites and contents
  • Application Control: restricts the access to unwelcome applications entirely or partly
  • User Authentication: transparent guideline management based on user log-in for users or groups
  • Secure VPN Connection: Protects the connection of branch offices and mobile devices to the company network (IPSec or VPN SSL support. Site to Site or Client to Site support)

Secure Internet Use

Office and B-2-B communication without using the Internet has become unthinkable nowadays. Many companies use web-based applications, communicate in social networks, via micro-blogging, stream multi-media contents and act in the "Cloud". It is not unusual, whether allowed by guidelines or not, that private and business-related online traffic overlap. Especially social networks like Facebook, Twitter or YouTube offer an ideal gateway for cyber-attacks.

The phishing attempts with elaborately placed links from seemingly reliable sources, hashtags, advertisements, pictures and photos that have been exploited for the transfer of malware are becoming more and more targeted and complex.

To stop malware, enforce compliance guidelines and to prevent unproductivity, it is no longer enough to filter data based on ports and protocols. IT administrators have to use much more granular approaches and manage settings on the level of applications.

With gateprotect security functions like Application Control, the applications used in companies can be protocoled and analyzed. The Internet use can be adjusted to the requirements of individual divisions of a company. By blocking certain applications, bandwidth can be optimally exploited - and the access gateways for malware and spying attacks are reduced.

  • URL and Content Filter: blocks unwelcome websites and contents
  • Application Control: restricts the access to unwelcome applications entirely or partly
  • Reporting / Logging: logs all activities at the gateway and offers the possibility to evaluate protocols according to different parameters

Related List

Latest News

GPO100

GPO 110

GPO 150

Interfaces
GBE Ports: 4 4 4
System Performance*
Concurrent sessions: 125000 1750000 250000
New sessions pr. Second: 1500 2500 2500
IDS/IPS throughput (Mbps) 0 0 250
UTM throughput (Mbps) 0 100 100
VPN IPSec throughput (Mbps) 100 200 200
Firewall throughput (Mbps): 1000 1000 1700
Dimensions
H x W x D (mms) 43 x 165 x 106 42 x 210 x 210 42 x 210 x 210
Gross Weights (kgs): 1.70 2.90 2.90
Power
Input Voltage (V): AC 100V-240V AC 100-240 AC 100V-240V
Consumption (W) - full load / rating: 20 35 35
Environmental
Operating Temperature (°C): 0 ~ 40 0 ~ 40 0 ~ 40
Storage Temperature (°C): -10 ~ 70 -10 ~ 70 -10 ~ 70
Relative Humidity (Non condensing): 20 ~ 90% 20 ~ 90% 20 ~ 90%

Related List

Latest News