March 01, 2013
- Ease of Use:
- Value for Money:
- Overall Rating:
- Strengths: eGUI interface makes policy creation easy and granular.
- Weaknesses: Can be too expensive for many environments.
- Verdict: The strength here is in the policies – a solid, configurable product that can be finetuned for your requirement.
The gateprotect GPZ5000 is the ultimate multifunction security gateway appliance. This product features a full firewall with intrusion detection and prevention system; anti-malware at the gateway, including protection from viruses, worms and spyware; spam protection; web and URL content management; and application control. This appliance is built for the large enterprise with high throughput and multiple VLAN capability, along with QoS and user-based controls.
A couple of years ago when we reviewed this product, we said that the management console was difficult to use and hard to understand. After getting the chance to spend a bit more time with the product this go around and consequently becoming comfortable with the design of the gateprotect eGUI, we actually found that this tool has become a bit more easy to configure and use. The eGUI, especially, added to the process becoming somewhat more simple as it replaces the standard management interface with something more visual. Rules are created simply by establishing a map of the network and assigning rules or policies based on connections, users or groups.
The initial configuration of the appliance is done by connecting it to the network and then installing the management application on a machine on the same network. Once the appliance is powered on, it can be seen from the application, and the eGUI interface can be accessed by logging in. There is a setup wizard available, but it is actually much easier to configure the appliance from scratch using the drag-and-drop method of the eGUI. Overall, this appliance seems to get easier and easier to use every time we see it.
Documentation included a one-page quick-start guide - that provided the steps to access the appliance initially - and a full administrator guide. The administrator guide covered the appliance from initial configuration all the way through advanced management and use of the appliance features. This also included many step-by-step instructions, configuration examples and screen shots. We found all documentation to be well-organized and to provide a good amount of detail.
The company offers no-cost phone and email technical support during evaluations and the first 30 days after purchase of the product. After the first 30 days, customers can purchase additional assistance through a contract. The company offers both eight-hours-a-day/five-days-a-week and 24/7 support options, which include phone- and email-based technical help. Customers also have no-cost access to an online support area that provides a knowledge base, FAQ section, user forum, product downloads,and other resources.
At a price just shy of $20,000, this product is not inexpensive by any means. However, we find this solution to be an excellent value for the money. While the price may seem high at first, it is balanced by the overall ease of use of this appliance. Not only is this appliance easy to manage overall, it has a very high degree of flexibility in policy configuration, with the help of the eGUI interface.
Sign up to our newsletters
SC Magazine Articles
- Microsoft report explores dangers of running expired security software
- Survey: real-time SIEM solutions help orgs detect attacks within minutes
- Vulnerabilities identified in three Advantech products
- Android malware 'NotCompatible' evolves, spawns resilient botnet
- State Department hack may be tied to White House network breach
- Operators disable firewall features to increase network performance, survey finds
- Waste no time patching Windows Schannel, OLE bugs, experts warn
- Study: 68 percent of healthcare breaches caused by loss or theft of devices, files
- Spin.com redirects to Rig Exploit Kit, infects users with malware, Symantec observes
- Upping the ante: PCI Security Standard
- Study: Third of employees use company devices for social media and online shopping
- 'DoubleDirect' MitM attack affects iOS, Android and OS X users
- Swedish appeals court nixes Assange's plea
- Critical XSS vulnerability addressed in WordPress
- The Internet of Things (IoT) will fail if security has no context