panda security portfolio - lec-expo.com · complementing the adaptive defense 360 security...
TRANSCRIPT
pandasecurity.com/enterprise
Panda Security PortfolioOur vision is to enable individuals and organizations to enjoy technology safely and securely.To consistently safeguard everyone’s digital lives through high performance, secure, and effective systems that fight against all threats.
advancedcybersecurity
Panda Security in numbers
The Cloud Security Company
Since its foundation in 1990, Panda Security has become the European security company developing advanced cybersecurity solutions, management technologies and monitoring tools.
We protect over 30 milion users in 195 countries and we have direct subsidiaries in Italy, United States of America, Canada, Mexico, Brazil, Germany, Austria, United Kingdom, Sweden, Finland, Belgium, Netherlands, France and Portugal.We have also local officies in 80 countries with our Country Partners.We traslate always all products with up to 23 languages supported.
pandasecurity.com/enterprise
Innovative on Cloud Security Services
More than 27 years of innovation
Panda Security is a Spanish multinational specialized in the development of IT security solutions. Initially focused on the development of antivirus software, the company has since expanded its line of business to advanced cyber-security services with technology for preventing cyber-crime.Its patented technology TruPrevent, a set of proactive capabilities aimed at blocking unknown viruses, along with its Collective Intelligence model, the first system to automatically detect, analyze, and classify malware in real time, have been the precursors to the new Adaptive Defense security model.
Over the course of its 27 years, Panda has marked some of the most important advances in the world of cybersecurity.
1998First daily signature
2004First behavior analysis
2007First product to use cloud-based scannig
2015EDR security model released
2016 The only European Security vendor listed in Gartner Market Guide for EDR
2017 Unique vendor that
releases technology for GDPR
2012First security vendor 100% cloud based
advancedcybersecurity
A new Cybersecurity Model
Visualization
In
teg
rati
ons
COLLECTIVE INTELLIGENCE
PANDAADAPTIVEDEFENSEPLATFORM
Thre
at hunting & investigation service
MachineLearning
AdvancedReporting Tool
Manual Classification & Supervisión
API
SIEMFeeder
Data Control
Hunting & Forensic Tools
Tools
Pand
a A
dapt
ive
Def
ense
100% Atestation Servic
eDetects and blocks malware that any other protection system misses. Adaptive Defense 360 is the first cybersecurity service that combines next-generation protection (NG EPP) and detection and remediation technologies (EDR), with the ability to classify 100% of running processes.
EDR Advanced Protection Solutions
All solutions and services in one platform
Certifies each and every running application. Adaptive Defense is the only endpoint detection and response (EDR) solution that can accurately classify all the running applications in your organization.
Adaptive Defense 360
Adaptive Defense
pandasecurity.com/enterprise
A new Cybersecurity Model
From data to actionable IT and security Insight. This module aggregates all the data gathered, correlating and graphically presenting it in real time to offer granular visibility into any event that takes place on the network.
All solutions and services in one platform
Panda Audit Service offers real time monitoring with detailed information about each action executed and identifies critical vulnerabilities.
Panda Data Control offers visibility and supervision of unstructured personal data in real time and in a single solution, with only one agent and from the same platform. It helps to avoid uncontrolled access to personal data, as well as sensitive corporate data, and aides in compliance with the GDPR*.
Advanced Reporting Tool SIEM Feeder
Audit ServicePanda Data Control
If you already have a SIEM solution, you can generate added value and obtain greater visibility into everything happening on your network by incorporating all the data Gathered by Adaptive Defense.
advancedcybersecurity
Machine Learning, Threat Hunting and Investigation Service
The Machine Learning algorithms implemented by Panda Security are based on the “Ranker on ensemble of models” model. Each of these is designed to return a classification verdict for each unknown process that a host / user tries to execute. Each of them is assigned a score, called “score”. The final verdict is weighted on the partial results elaborated by the predictive models of the algorithms and the model used (ensemble) to guarantee the maximization of accuracy, the certainty of the result and a number of false positives equal to 0.
Complementing the Adaptive Defense 360 security solution, the Threat Hunting and Investigation Service provides an unparalleled level of protection at no additional cost.Panda Security has decided to implement a managed service able to identify those that can be identified as hacker attacks, lateral movements following a malicious attack, or malicious behavior through the use of legitimate software (ie not in the presence of malicious code).The Threat Hunting and Investigation Service (THIS) also aims to highlight and notify traces of attack, which may have been left in past periods (IOC), or from an attack in progress at the time of detection (IOA).
Machine Learning Threat Hunting and Investigation Service
pandasecurity.com/enterprise
Endpoint Security & Management Control
Endpoint ProtectionSecurity Solutions
Endpoint Managementand Security Solutions
Endpoint Protection provides centralized protection for all of your Windows, Mac and Linux workstations, including laptops, smartphones and the leading virtualization systems.
Systems Management allows simple and affordable management, monitoring and support of all the devices in your company, whether they are in the office or on the move.
Endpoint Protection Plus provides a unified security solution for all of your Windows, Mac and Linux workstations, including laptops, smartphones and the leading virtualization systems. Endpoint Protection Plus provides also Web & Content filter and MS Exchange AntiSpam & AntiMalware Solution.
Fusion protects, manages and provides remote support to all the devices in your network, including smartphones and tablets. Fusion includes Endpoint Protection Plus and Systems management in a single solutions bundle.
Systems Management
FusionEndpoint Protection Plus
Endpoint Protection
advancedcybersecurity
Endpoint Security & Management Control
Today, 99.96% of active vulnerabilities in corporate endpoints are related to missing updates which, if installed, would greatly prevent the security risk. Additionally, 86% of corporate endpoints are missing critical patches for third-party applications such as Java, Adobe, Mozilla, Firefox, Chrome, Flash, and OpenOffice, among others.
If this trend continues, by 2020, 99% of the vulnerabilities causing security incidents will be known exploits that could be easily avoided by being patched before the incident.It is time to change this trend with Panda Patch Management.Panda Patch Management is a user-friendly solution for managing vulnerabilities of the operating systems and third-party applications on Windows workstations and servers. It reduces risk while strengthening the prevention, containment and attack surface reduction capabilities of your organization.
Panda Patch Management
Panda Patch Management multiplies the preventive, detection and response capabilities of Panda Security's endpoint solutions by enabling a robust
Certifications and awards:
BENEFITS
Panda Patch Management allows, within a single user-friendly solution:
• Audit, monitor and prioritize operating systems and application updates. The single-panel view offers centralized up-to-the-minute and aggregated visibility into the security status of the organization with regard to vulnerabilities, patches and pending updates of the systems and hundreds of applications.
• Prevent incidents, systematically reducing the attack surface created by software vulnerabilities. Handling patches and updates with easy-to-use, real-time management tools that enable organizations to get ahead of vulnerability exploitation attacks.
• Contain and mitigate vulnerability exploitation attacks with immediate updates. Panda Adaptive Defense 360 console, in conjunction with Patch Management, allows organizations to correlate detected threats and exploits with the uncovered vulnerabilities. Response time is minimized, containing and remediating attacks by pushing out patches immediately from the web console. Additionally, affected computers can be isolated from the rest of the network, preventing the attack from spreading.
• Reduce operating costs.
- Panda Patch Management does not require the deployment or update of any new or existing endpoint agents, simplifying management and avoiding workstation and server overloads.
- Minimizes patching efforts as updates are launched remotely from the cloud-based console. Additionally, installation is optimized to minimize errors.
- Provides complete, unattended visibility into all vulnerabilities, pending updates and EoL applications immediately after activation.
• Comply with the accountability principle contemplated in many regulations (GDPR, HIPAA and PCI). It forces organizations to take the appropriate technical and organizational measures to ensure proper protection of the sensitive data under their control.
KEY FEATURES
Panda Patch Management provides all necessary tools to manage, from a single console, the security and updates of the operating system and third-party applications:
Discovery:
Single-panel view with real-time information of all vulnerable computers, pending patches and unsupported (EOL ) software, with their remediation status.• Detailed information about patches and pending
updates, details of the relevant security bulletin, as well as computer and computer group information, and more. Available actions:- Filter and search for patches based on criticality,
computer, group, application, patch, CVE ID and status.
- Ability to take actions directly on computers: restart, install now or schedule.
• Configurable alerts upon finding vulnerable workstations or servers.
• Unattended scanning for pending updates, in real time or at periodic intervals (3, 6, 12 or 24 hours).
• In exploit detections, notification of pending patches. Ability to launch installations immediately or scheduled from the console, isolating the computer if required.
Patch and update planning and installation tasks: • Configurable by criticality and application.• Can be performed on specific endpoints and groups.• Immediate, or scheduled for one-time execution or
for repeated execution at regular intervals (date/time).
• Ability to control computer restarts and set exceptions.
Endpoint and update status monitoring, via: • Dashboard and actionable lists.• High-level and detailed reports.• Lists of updated computers, computers with pending
updates with errors.Granular management based on groups and roles with different permissions:• Role-based visibility into vulnerable computers,
patches and Service Packs.
NOV 2017
Panda Security regularly participates and obtains awards on protection and performance from Virus Bulletin, AV-Comparatives, AV-Test, NSSLabs.
Panda Adaptive Defense achieved the EAL2+ certification in its evaluation for the Common Criteria standard.
"Gartner Named Panda Security as a Visionary in Gartner Magic Quadrant for Endpoint Protection Platforms (EPP) in 2018” https://www.pandasecurity.com/gartner-magic-quadrant/
Compatible with the following solutions within Aether Platform:
Supported Operating Systems: Windows XP SP3+. Windows Server 2003 (32/64 bits and R2) SP2+
Supported 3rd-party applications: https://www.pandasecurity.com/business/PatchManagementApp
Panda Endpoint Protection PlusPanda Endpoint Protection
Panda Adaptive Defense Panda Adaptive Defense 360
Panda Patch Management
pandasecurity.com/enterprise
The benefits that characterize our new platform Aether will allow you to have a more scalable and reliable platform, leaverage on the latest agent communication protocol, increase the solution customisation, and meet all of the needs coming from the evolving threats.
This management platform is based on 8 pillars:Real-Time information, Multi-Product, Cross-Platform, Multi-Customer, Granular, Flexible, Detailed and Accessible via API.
The new Platform for managing Panda Security solutions
The innovative and integrated platform for all Panda Security endpoint security solutions. Everything you need from a single Web console, with a single light agent.
Aether Platform
advancedcybersecurity
ISP & ROL Portal allows you to integrate your CRM with Panda Security API technologies in order to full automatize security services subscriptions, thanks to cloud-based flexibile platform. Resell your security services with the monthly-basis license model. Activate, deactivate and manage your customers subscriptions with a simple Web interface.
Managed Security Services Product & License Management
Solutions for Partners
Partner Center allows you to manage your customers’ security and accurately control their service subscriptions, thanks to an easy-to-use cloud-based Web platform. All the licenses you purchase are automatically added to your partner account so that you can directly assign them to your customers from the dashboard. Cancel your customers’ services or licenses with a click. Recover unused licenses and assign them to new or existing accounts. See a full history of assigned licenses. Create trials simply. Automatically renew your customers’ licenses. Cross-sell and upsell directly from the dashboard. And much more...
Thanks to the CSP Distributor marketplace you can easily activate all the Panda Security solutions in the monthly-basis model without any upfornt commitment or minimun buying quantity. You can also manage your customer security subscriptions through a powerful cloud Distributor Market Place.
Partner Center
ISP & ROL Portal
CSP Marketplace
pandasecurity.com/enterprise
Productivity solutions
Security Email Protection Remote Control Solution
Email Protection is a service that provides multi-layer protection for your company’s email. In addition, thanks to its advanced cloud-based scanning technologies it does not require any additional infrastructure to start operating. Manage email security by company, domain or user. Manage the centralized quarantine in order to perform actions or apply usage policies to the company’s email. Use the rules engine to set criteria for automatic processing of spam Proactive anti-malware, anti-phishing, anti-spyware and anti-spam protection, based on Collective Intelligence.
With Panda Remote Control, your IT Department will be able to access users’ Windows systems directly and remotely, anytime, anywhere. Forget about additional software and hardware deployments or specific network configurations, your single central console will allow your IT Department to make the most of the service quickly and from the outset. Resolve problems without interrupting users. Save money as you won’t need new hardware or software infrastructures. Make the most of the service from the outset: no additional software deployments needed, no additional access requirements: All you need is a Web browser and an Internet connection.
Email Protection Remote Control Module
More info at:
pandasecurity.com/enterprise
pandasecurity.com