1
1 Panda Endpoint Protection Suites Index: A New Endpoint - - PDF document
1 Panda Endpoint Protection Suites Index: A New Endpoint - - PDF document
1 Panda Endpoint Protection Suites Index: A New Endpoint Environment A New Endpoint Solution t A New Endpoint Environment i i t E E d A N The New Endpoint Reality Increasing Malware Risk 2M malware signatures identified
Panda Endpoint Protection Suites
Index:
– A New Endpoint Environment – A New Endpoint Solution
A N E d i t E i t A New Endpoint Environment
The New Endpoint Reality
– Increasing Malware Risk
» 2M malware signatures identified monthly g y » 3rd party software now #1 malware attack vector » 70% of all serious data loss incidents sparked by an insider p y
– Ineffectiveness of Anti-Virus alone
» Increasing malware sophistication » Less than 19% of malware newer than 30 days is detected » 50% of IT professionals point to malware as the leading cause of rising endpoint TCO
Challenges of Endpoint Management
- IT Operations Challenges
- IT Security Challenges
» Lack of Common Management Console » Need for better accuracy » User access rights (Local Admin) » Increasing Agent Bloat » Increasing and costly back-end Integration » Lack of Scalability » Silos and insufficient collaboration bet een IT and b siness operations » Lack of visibility and collaboration with IT security between IT and business operations
Lack of integration across technologies is the #1 IT security risk IT security risk
A N E d i t S l ti A New Endpoint Solution
Panda Endpoint Protection Suites
Total Endpoint Management p g Optimized IT Control
Panda Panda Endpoint Protection Endpoint Protection Suites Suites Panda Panda Endpoint Protection Endpoint Protection Suites Suites
Reduced Reduced Endpoint Complexity
Panda Endpoint Protection Suites
Total Endpoint Management
» Comprehensive solution suite that unifies IT operational and security functions » Delivers a more effective defense n depth endpoint security » Delivers a more effective defense-n-depth endpoint security solution » Simplifies endpoint system and agent management through a single console » Centralizes policy management and reporting » Expands operational and security visibility » Expands operational and security visibility » Reduces technology complexity and integration costs » Flexible and modularly licensed best-of-breed application y pp modules » Scalable and agile single-agent, single-server platform architecture architecture
Panda Endpoint Protection Suites
Endpoint Operations Management
» Expanded visibility and control through comprehensive discovery of endpoints in both online and offline modes » Heterogeneous O/S environment support for Linux (RHEL) Oracle » Heterogeneous O/S environment support for Linux (RHEL), Oracle Enterprise Linux, Microsoft, Mac » Largest 3rd party application vulnerability content support including: Adobe, Microsoft, Apple and others » Integrated Wake-on-LAN ensures effective policy management across online and offline machines across online and offline machines » Power Management supports custom power policy definition and reporting » Configuration Management NIST-validated solution, with comprehensive list of SCAP policies M d t b li i t/ t f ffi i t di ti f » Mandatory baseline import/export for efficient syndication of baseline polices
Panda Endpoint Protection Suites
Endpoint Security
» Granular policy-based whitelisting, , blacklisting, and device policy distribution via roles and user groups » Comprehensive discovery of all applications online and offline » Comprehensive discovery of all applications, online and offline machines, and removable media devices » Proactive protection against Zero day threats via traditional p g y signature-matching, DNA matching and SandBox technologies, combined with application whitelisting policy Eff ti l l t l d t i t » Effective malware removal to ensure cleaned system environments » Intelligent Whitelisting integrated workflow across antivirus, application control and patch management for efficient flexible and application control, and patch management for efficient, flexible and effective application white list policy management » Flexible Trust Engine (graylisting) for change management across g (g y g) g g processes, paths, users, vendors
Panda Endpoint Protection Suites
- How do we make it efficient and simple?
Agile platform architecture L i ti d i t t h l Leverage existing endpoint technology Reduced integration and maintenance costs I d d i t f Improved endpoint performance More effective endpoint security
Panda Endpoint Protection Suites
- Agile
Scalable Extensible and Customizable Extensible and Customizable Modular
- Secure
Reduced threat landscape Reduced # of security incidents Reduced insider risk
- Compliant
Reduced cost of compliance Reduced litigation risk Continuous policy management
- Optimal
Greater collaboration between security and operations teams Greater collaboration between security and operations teams Enhanced IT visibility Trust centric change management Centralized Systems and Policy Management y y g
Benefits
Endpoint Operations Endpoint Security
Intelligent Whitelisting
Device Control Asset Configuration
Trusted
Patch Management Application Control Asset Management Software Management Power Management Configuration Management
Trusted Change
Anti Virus/Spyware Windows Firewall Management g g Reporting