panda security portfolio - lec-expo.com · complementing the adaptive defense 360 security...

12
pandasecurity.com/enterprise Panda Security Portfolio Our vision is to enable individuals and organizations to enjoy technology safely and securely. To consistently safeguard everyone’s digital lives through high performance, secure, and effective systems that fight against all threats.

Upload: others

Post on 27-Jul-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Panda Security Portfolio - lec-expo.com · Complementing the Adaptive Defense 360 security solution, the Threat Hunting and Investigation Service provides an unparalleled level of

pandasecurity.com/enterprise

Panda Security PortfolioOur vision is to enable individuals and organizations to enjoy technology safely and securely.To consistently safeguard everyone’s digital lives through high performance, secure, and effective systems that fight against all threats.

Page 2: Panda Security Portfolio - lec-expo.com · Complementing the Adaptive Defense 360 security solution, the Threat Hunting and Investigation Service provides an unparalleled level of

advancedcybersecurity

Panda Security in numbers

The Cloud Security Company

Since its foundation in 1990, Panda Security has become the European security company developing advanced cybersecurity solutions, management technologies and monitoring tools.

We protect over 30 milion users in 195 countries and we have direct subsidiaries in Italy, United States of America, Canada, Mexico, Brazil, Germany, Austria, United Kingdom, Sweden, Finland, Belgium, Netherlands, France and Portugal.We have also local officies in 80 countries with our Country Partners.We traslate always all products with up to 23 languages supported.

Page 3: Panda Security Portfolio - lec-expo.com · Complementing the Adaptive Defense 360 security solution, the Threat Hunting and Investigation Service provides an unparalleled level of

pandasecurity.com/enterprise

Innovative on Cloud Security Services

More than 27 years of innovation

Panda Security is a Spanish multinational specialized in the development of IT security solutions. Initially focused on the development of antivirus software, the company has since expanded its line of business to advanced cyber-security services with technology for preventing cyber-crime.Its patented technology TruPrevent, a set of proactive capabilities aimed at blocking unknown viruses, along with its Collective Intelligence model, the first system to automatically detect, analyze, and classify malware in real time, have been the precursors to the new Adaptive Defense security model.

Over the course of its 27 years, Panda has marked some of the most important advances in the world of cybersecurity.

1998First daily signature

2004First behavior analysis

2007First product to use cloud-based scannig

2015EDR security model released

2016 The only European Security vendor listed in Gartner Market Guide for EDR

2017 Unique vendor that

releases technology for GDPR

2012First security vendor 100% cloud based

Page 4: Panda Security Portfolio - lec-expo.com · Complementing the Adaptive Defense 360 security solution, the Threat Hunting and Investigation Service provides an unparalleled level of

advancedcybersecurity

A new Cybersecurity Model

Visualization

In

teg

rati

ons

COLLECTIVE INTELLIGENCE

PANDAADAPTIVEDEFENSEPLATFORM

Thre

at hunting & investigation service

MachineLearning

AdvancedReporting Tool

Manual Classification & Supervisión

API

SIEMFeeder

Data Control

Hunting & Forensic Tools

Tools

Pand

a A

dapt

ive

Def

ense

100% Atestation Servic

eDetects and blocks malware that any other protection system misses. Adaptive Defense 360 is the first cybersecurity service that combines next-generation protection (NG EPP) and detection and remediation technologies (EDR), with the ability to classify 100% of running processes.

EDR Advanced Protection Solutions

All solutions and services in one platform

Certifies each and every running application. Adaptive Defense is the only endpoint detection and response (EDR) solution that can accurately classify all the running applications in your organization.

Adaptive Defense 360

Adaptive Defense

Page 5: Panda Security Portfolio - lec-expo.com · Complementing the Adaptive Defense 360 security solution, the Threat Hunting and Investigation Service provides an unparalleled level of

pandasecurity.com/enterprise

A new Cybersecurity Model

From data to actionable IT and security Insight. This module aggregates all the data gathered, correlating and graphically presenting it in real time to offer granular visibility into any event that takes place on the network.

All solutions and services in one platform

Panda Audit Service offers real time monitoring with detailed information about each action executed and identifies critical vulnerabilities.

Panda Data Control offers visibility and supervision of unstructured personal data in real time and in a single solution, with only one agent and from the same platform. It helps to avoid uncontrolled access to personal data, as well as sensitive corporate data, and aides in compliance with the GDPR*.

Advanced Reporting Tool SIEM Feeder

Audit ServicePanda Data Control

If you already have a SIEM solution, you can generate added value and obtain greater visibility into everything happening on your network by incorporating all the data Gathered by Adaptive Defense.

Page 6: Panda Security Portfolio - lec-expo.com · Complementing the Adaptive Defense 360 security solution, the Threat Hunting and Investigation Service provides an unparalleled level of

advancedcybersecurity

Machine Learning, Threat Hunting and Investigation Service

The Machine Learning algorithms implemented by Panda Security are based on the “Ranker on ensemble of models” model. Each of these is designed to return a classification verdict for each unknown process that a host / user tries to execute. Each of them is assigned a score, called “score”. The final verdict is weighted on the partial results elaborated by the predictive models of the algorithms and the model used (ensemble) to guarantee the maximization of accuracy, the certainty of the result and a number of false positives equal to 0.

Complementing the Adaptive Defense 360 security solution, the Threat Hunting and Investigation Service provides an unparalleled level of protection at no additional cost.Panda Security has decided to implement a managed service able to identify those that can be identified as hacker attacks, lateral movements following a malicious attack, or malicious behavior through the use of legitimate software (ie not in the presence of malicious code).The Threat Hunting and Investigation Service (THIS) also aims to highlight and notify traces of attack, which may have been left in past periods (IOC), or from an attack in progress at the time of detection (IOA).

Machine Learning Threat Hunting and Investigation Service

Page 7: Panda Security Portfolio - lec-expo.com · Complementing the Adaptive Defense 360 security solution, the Threat Hunting and Investigation Service provides an unparalleled level of

pandasecurity.com/enterprise

Endpoint Security & Management Control

Endpoint ProtectionSecurity Solutions

Endpoint Managementand Security Solutions

Endpoint Protection provides centralized protection for all of your Windows, Mac and Linux workstations, including laptops, smartphones and the leading virtualization systems.

Systems Management allows simple and affordable management, monitoring and support of all the devices in your company, whether they are in the office or on the move.

Endpoint Protection Plus provides a unified security solution for all of your Windows, Mac and Linux workstations, including laptops, smartphones and the leading virtualization systems. Endpoint Protection Plus provides also Web & Content filter and MS Exchange AntiSpam & AntiMalware Solution.

Fusion protects, manages and provides remote support to all the devices in your network, including smartphones and tablets. Fusion includes Endpoint Protection Plus and Systems management in a single solutions bundle.

Systems Management

FusionEndpoint Protection Plus

Endpoint Protection

Page 8: Panda Security Portfolio - lec-expo.com · Complementing the Adaptive Defense 360 security solution, the Threat Hunting and Investigation Service provides an unparalleled level of

advancedcybersecurity

Endpoint Security & Management Control

Today, 99.96% of active vulnerabilities in corporate endpoints are related to missing updates which, if installed, would greatly prevent the security risk. Additionally, 86% of corporate endpoints are missing critical patches for third-party applications such as Java, Adobe, Mozilla, Firefox, Chrome, Flash, and OpenOffice, among others.

If this trend continues, by 2020, 99% of the vulnerabilities causing security incidents will be known exploits that could be easily avoided by being patched before the incident.It is time to change this trend with Panda Patch Management.Panda Patch Management is a user-friendly solution for managing vulnerabilities of the operating systems and third-party applications on Windows workstations and servers. It reduces risk while strengthening the prevention, containment and attack surface reduction capabilities of your organization.

Panda Patch Management

Panda Patch Management multiplies the preventive, detection and response capabilities of Panda Security's endpoint solutions by enabling a robust

Certifications and awards:

BENEFITS

Panda Patch Management allows, within a single user-friendly solution:

• Audit, monitor and prioritize operating systems and application updates. The single-panel view offers centralized up-to-the-minute and aggregated visibility into the security status of the organization with regard to vulnerabilities, patches and pending updates of the systems and hundreds of applications.

• Prevent incidents, systematically reducing the attack surface created by software vulnerabilities. Handling patches and updates with easy-to-use, real-time management tools that enable organizations to get ahead of vulnerability exploitation attacks.

• Contain and mitigate vulnerability exploitation attacks with immediate updates. Panda Adaptive Defense 360 console, in conjunction with Patch Management, allows organizations to correlate detected threats and exploits with the uncovered vulnerabilities. Response time is minimized, containing and remediating attacks by pushing out patches immediately from the web console. Additionally, affected computers can be isolated from the rest of the network, preventing the attack from spreading.

• Reduce operating costs.

- Panda Patch Management does not require the deployment or update of any new or existing endpoint agents, simplifying management and avoiding workstation and server overloads.

- Minimizes patching efforts as updates are launched remotely from the cloud-based console. Additionally, installation is optimized to minimize errors.

- Provides complete, unattended visibility into all vulnerabilities, pending updates and EoL applications immediately after activation.

• Comply with the accountability principle contemplated in many regulations (GDPR, HIPAA and PCI). It forces organizations to take the appropriate technical and organizational measures to ensure proper protection of the sensitive data under their control.

KEY FEATURES

Panda Patch Management provides all necessary tools to manage, from a single console, the security and updates of the operating system and third-party applications:

Discovery:

Single-panel view with real-time information of all vulnerable computers, pending patches and unsupported (EOL ) software, with their remediation status.• Detailed information about patches and pending

updates, details of the relevant security bulletin, as well as computer and computer group information, and more. Available actions:- Filter and search for patches based on criticality,

computer, group, application, patch, CVE ID and status.

- Ability to take actions directly on computers: restart, install now or schedule.

• Configurable alerts upon finding vulnerable workstations or servers.

• Unattended scanning for pending updates, in real time or at periodic intervals (3, 6, 12 or 24 hours).

• In exploit detections, notification of pending patches. Ability to launch installations immediately or scheduled from the console, isolating the computer if required.

Patch and update planning and installation tasks: • Configurable by criticality and application.• Can be performed on specific endpoints and groups.• Immediate, or scheduled for one-time execution or

for repeated execution at regular intervals (date/time).

• Ability to control computer restarts and set exceptions.

Endpoint and update status monitoring, via: • Dashboard and actionable lists.• High-level and detailed reports.• Lists of updated computers, computers with pending

updates with errors.Granular management based on groups and roles with different permissions:• Role-based visibility into vulnerable computers,

patches and Service Packs.

NOV 2017

Panda Security regularly participates and obtains awards on protection and performance from Virus Bulletin, AV-Comparatives, AV-Test, NSSLabs.

Panda Adaptive Defense achieved the EAL2+ certification in its evaluation for the Common Criteria standard.

"Gartner Named Panda Security as a Visionary in Gartner Magic Quadrant for Endpoint Protection Platforms (EPP) in 2018” https://www.pandasecurity.com/gartner-magic-quadrant/

Compatible with the following solutions within Aether Platform:

Supported Operating Systems: Windows XP SP3+. Windows Server 2003 (32/64 bits and R2) SP2+

Supported 3rd-party applications: https://www.pandasecurity.com/business/PatchManagementApp

Panda Endpoint Protection PlusPanda Endpoint Protection

Panda Adaptive Defense Panda Adaptive Defense 360

Panda Patch Management

Page 9: Panda Security Portfolio - lec-expo.com · Complementing the Adaptive Defense 360 security solution, the Threat Hunting and Investigation Service provides an unparalleled level of

pandasecurity.com/enterprise

The benefits that characterize our new platform Aether will allow you to have a more scalable and reliable platform, leaverage on the latest agent communication protocol, increase the solution customisation, and meet all of the needs coming from the evolving threats.

This management platform is based on 8 pillars:Real-Time information, Multi-Product, Cross-Platform, Multi-Customer, Granular, Flexible, Detailed and Accessible via API.

The new Platform for managing Panda Security solutions

The innovative and integrated platform for all Panda Security endpoint security solutions. Everything you need from a single Web console, with a single light agent.

Aether Platform

Page 10: Panda Security Portfolio - lec-expo.com · Complementing the Adaptive Defense 360 security solution, the Threat Hunting and Investigation Service provides an unparalleled level of

advancedcybersecurity

ISP & ROL Portal allows you to integrate your CRM with Panda Security API technologies in order to full automatize security services subscriptions, thanks to cloud-based flexibile platform. Resell your security services with the monthly-basis license model. Activate, deactivate and manage your customers subscriptions with a simple Web interface.

Managed Security Services Product & License Management

Solutions for Partners

Partner Center allows you to manage your customers’ security and accurately control their service subscriptions, thanks to an easy-to-use cloud-based Web platform. All the licenses you purchase are automatically added to your partner account so that you can directly assign them to your customers from the dashboard. Cancel your customers’ services or licenses with a click. Recover unused licenses and assign them to new or existing accounts. See a full history of assigned licenses. Create trials simply. Automatically renew your customers’ licenses. Cross-sell and upsell directly from the dashboard. And much more...

Thanks to the CSP Distributor marketplace you can easily activate all the Panda Security solutions in the monthly-basis model without any upfornt commitment or minimun buying quantity. You can also manage your customer security subscriptions through a powerful cloud Distributor Market Place.

Partner Center

ISP & ROL Portal

CSP Marketplace

Page 11: Panda Security Portfolio - lec-expo.com · Complementing the Adaptive Defense 360 security solution, the Threat Hunting and Investigation Service provides an unparalleled level of

pandasecurity.com/enterprise

Productivity solutions

Security Email Protection Remote Control Solution

Email Protection is a service that provides multi-layer protection for your company’s email. In addition, thanks to its advanced cloud-based scanning technologies it does not require any additional infrastructure to start operating. Manage email security by company, domain or user. Manage the centralized quarantine in order to perform actions or apply usage policies to the company’s email. Use the rules engine to set criteria for automatic processing of spam Proactive anti-malware, anti-phishing, anti-spyware and anti-spam protection, based on Collective Intelligence.

With Panda Remote Control, your IT Department will be able to access users’ Windows systems directly and remotely, anytime, anywhere. Forget about additional software and hardware deployments or specific network configurations, your single central console will allow your IT Department to make the most of the service quickly and from the outset. Resolve problems without interrupting users. Save money as you won’t need new hardware or software infrastructures. Make the most of the service from the outset: no additional software deployments needed, no additional access requirements: All you need is a Web browser and an Internet connection.

Email Protection Remote Control Module

Page 12: Panda Security Portfolio - lec-expo.com · Complementing the Adaptive Defense 360 security solution, the Threat Hunting and Investigation Service provides an unparalleled level of

More info at:

pandasecurity.com/enterprise

pandasecurity.com