Diese Präsentation wurde erfolgreich gemeldet.
Die SlideShare-Präsentation wird heruntergeladen. ×

Panda Security - Endpoint Protection

Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Wird geladen in …3
×

Hier ansehen

1 von 15 Anzeige

Panda Security - Endpoint Protection

Herunterladen, um offline zu lesen

Panda Endpoint Protection is the cloud based solution that allows you to manage the security of your network endpoints (Windows, Mac, Linux and Android), without interfering with the performance and with minimum cost.

More info: http://www.pandasecurity.com/enterprise/solutions/cloud-office-protection/

Panda Endpoint Protection is the cloud based solution that allows you to manage the security of your network endpoints (Windows, Mac, Linux and Android), without interfering with the performance and with minimum cost.

More info: http://www.pandasecurity.com/enterprise/solutions/cloud-office-protection/

Anzeige
Anzeige

Weitere Verwandte Inhalte

Diashows für Sie (20)

Ähnlich wie Panda Security - Endpoint Protection (20)

Anzeige

Weitere von Panda Security (20)

Aktuellste (20)

Anzeige

Panda Security - Endpoint Protection

  1. 1. Simple and Ultra-light security solution
  2. 2. Content 1. The problems of malware and IT departments 2. What is Panda Endpoint Protection? 3. Features and Benefits 4. Resources and infrastructure required 18/06/2015Panda Endpoint Protection 2
  3. 3. The Problem of malware and IT departments 18/06/2015Panda Endpoint Protection 3
  4. 4. Malware’s volume evolution a. More than 200,000 new samples a day. b. The volume of new malware samples generated in 2014 represents 20% of all malware created in the last 20 years. 18/06/2015Panda Endpoint Protection 4 100 new samples detected every day 1369 new samples detected every day More than 200,000 new samples detected every day VIRUSES SPYWARE BOTS TROJANS TARGETED ATTACKS ZERO-DAY ATTACKS DYNAMIC TROJANS
  5. 5. Evolution of the business IT infrastructure A more complex infrastructure to manage. • BYOD. • Roaming workers and remote offices. • Heterogeneous operating systems. • More software installed come more vulnerabilities. Companies internal process more dependent on technology. Sizing IT departments without changes or downwards. GREATER VULNERABILITY AND MANAGEMENT COMPLEXITY 18/06/2015Panda Endpoint Protection 5 IT infrastructures evolution Infrastructure Technology dependence IT
  6. 6. What is Panda Endpoint Protection? 18/06/2015Panda Endpoint Protection 6
  7. 7. What is Panda Endpoint Protection? Panda Endpoint Protection is the cloud based solution that allows you to manage the security of your network endpoints (Windows, Mac, Linux and Android), without interfering with the performance and with minimum cost. 18/06/2015Panda Endpoint Protection 7 Managed centrally from a simple web browser so there is no need for servers. Service offered from the cloud. No technicians needed, easy to manage service. Cross platform and mobility. Complete protection: email, web, network and external devices.
  8. 8. Features and Benefits 18/06/2015Panda Endpoint Protection 8
  9. 9. Cross-platform security Benefits 18/06/2015Panda Endpoint Protection 9 Extremely Light Easy to manage
  10. 10. Extremely light All operations are performed in the cloud: impact on endpoint performance is virtually zero. Light on memory use. • Small signature files. • Real-time access to collective intelligence. • Cloud-based malware database. Light on network use. • Download size reduced to a minimum. • Signatures shared among endpoints via P2P technology: download once and share across the network. Light on processor use. • Detection intelligence transfered to the cloud. • Lower use of processor resources on the user's endpoint. 18/06/2015Panda Endpoint Protection 10
  11. 11. Covers all infection vectors in Windows, Linux, Mac OS X and Android computers. Security in all attack vectors. • Browsing, email and file system protection. • Control of devices connected to the PC. Security against unknown threats • Anti-exploit technology prevents malware from exploiting unknown software flaws to infect computers. • Behavioral analysis to detect unknown malware. Security on all platforms. • Windows (from 2000 to 8.1). • Linux (Ubuntu certified, Red Hat, Debian, OpenSuse and Suse). • Mac OS X (10.6 – 10.10). • Android (from 2.3). • Virtual engines (WMware, Virtual PC, MS Hyper-V, Citrix). 18/06/2015Panda Endpoint Protection 11 Cross-platform security
  12. 12. Easy to manage Extremely easy to manage, with no maintenance or infrastructure required in the customer's network. Easy to maintain • No specific infrastructure required to host the solution. • Your IT team can focus on more productive tasks. Easy to protect remote users • Each endpoint communicates with the cloud. • Roadwarriors and remote office are protected naturally. • No need for special installations or configurations. Easy to deploy • Multiple deployment methods. • Automatic uninstallers for other antivirus solutions. • Easy setup. 18/06/2015Panda Endpoint Protection 12
  13. 13. Resources and infrastructure required 18/06/2015Panda Endpoint Protection 13
  14. 14. 18/06/2015Panda Endpoint Protection 14 NO ADDITIONAL INFRASTRUCTURE REQUIRED As a cloud-based service, all you need is an Internet connection and browser to access the console. SMOOTH LEARNING CURVE Intuitive and simple interface, with the most frequently used options at a click. ULTRA-LIGHT AGENT Low impact on system performance. Barely noticeable memory and CPU usage. Minimum bandwidth usage.
  15. 15. Thanks!

×