simple and light security solution content
play

Simple and light security solution Content 1. The problem of - PowerPoint PPT Presentation

Simple and light security solution Content 1. The problem of malware in IT environments 2. What is Panda Endpoint Protection Plus? 3. Features and benefits 4. Resources and infrastructure required Panda Endpoint Protection Plus


  1. Simple and light security solution

  2. Content 1. The problem of malware in IT environments 2. What is Panda Endpoint Protection Plus? 3. Features and benefits 4. Resources and infrastructure required Panda Endpoint Protection Plus 18/06/2015 2

  3. The problem of malware in IT environments Panda Endpoint Protection Plus 18/06/2015 3

  4. Malware’s a. More than 200,000 new samples a day. volume evolution b. The volume of new malware samples generated in 2014 represents 20% of all malware created in the last 20 years. TARGETED ATTACKS ZERO-DAY ATTACKS DYNAMIC TROJANS More than 200,000 new samples SPYWARE detected every day BOTS TROJANS 1369 new samples VIRUSES detected every day 100 new samples detected every day Panda Endpoint Protection Plus 18/06/2015 4

  5. Evolution of the A more complex infrastructure to manage. BYOD. • business IT Roaming workers and remote offices. • infrastructure Heterogeneous operating systems. • More software installed come more • vulnerabilities. Companies internal process more dependent on IT infrastructures evolution technology. Sizing IT departments without changes or Infrastructure downwards. Technology dependence IT GREATER VULNERABILITY AND MANAGEMENT COMPLEXITY Panda Endpoint Protection Plus 18/06/2015 5

  6. Productivity Email and Web browsing are the main gateway for malware and also two critical factors for productivity Email • Email criticality as a production tool • 95% of corporate email is infected or spam • Email is the most common attack method: it is essential to be up-to-date with the latest protection technologies Browsing: • The most recent threats, like bots, phishing and malicious active content attack users when they browse the Internet, then spread across corporate networks. Panda Endpoint Protection Plus 18/06/2015 6

  7. What is Panda Endpoint Protection Plus? Panda Endpoint Protection Plus 18/06/2015 7

  8. Panda Endpoint Protection Plus is the cloud-based solution that allows you to manage the security of all of the computers in your network and control user productivity at the lowest possible cost of ownership. Centralized No need for management technicians, an through a simple easy to manage Web browser and service. without needing servers. Service provided from the cloud. Productive employees: no spam and no browsing Cross-platform and mobility . Complete unauthorized websites. protection: email, Internet, network and external devices. Panda Endpoint Protection Plus 18/06/2015 8

  9. Features and benefits Panda Endpoint Protection Plus 18/06/2015 9

  10. Benefits Maximum Extremely Cross-platform Easy to productivity light security manage Panda Endpoint Protection Plus 18/06/2015 10

  11. Extremely light All operations are performed in the cloud: impact on endpoint performance is virtually zero. Light on memory use. Small signature files. • Real-time access to collective intelligence. • Cloud-based malware database. • Light on network use. Download size reduced to a minimum. • Signatures shared among endpoints via P2P • technology: download once and share across the network. Light on processor use. Detection intelligence transfered to the cloud. • Lower use of processor resources on the user's • endpoint. Panda Endpoint Protection Plus 18/06/2015 11

  12. Cross-platform security Covers all infection vectors in Windows, Linux, Mac OS X and Android computers. Security in all attack vectors. Browsing, email and file system protection. • Control of devices connected to the PC. • Security against unknown threats Anti-exploit technology prevents malware from • exploiting unknown software flaws to infect computers. Behavioral analysis to detect unknown malware. • Security on all platforms. Windows (from 2000 to 8.1). • Linux (Ubuntu certified, Red Hat, Debian, OpenSuse and • Suse). Mac OS X (10.6 – 10.10). • Android (from 2.3). • Virtual engines (WMware, Virtual PC, MS Hyper-V, Citrix). • Panda Endpoint Protection Plus 18/06/2015 12

  13. Maximum productivity Monitors and filters Web traffic and spam, allowing companies to focus on their business and forget about unproductive employee behavior. Website monitoring and filtering • Increases business productivity • Monitors Web browsing • Select the Web categories you consider dangerous or unproductive during working hours • Compatible with any Web browser No more saturated inboxes • Reduces the attack surface in Exchange servers through content filtering • Increases security and user productivity with the anti-malware and anti-spam engine, blocking junk mail and malicious messages Panda Endpoint Protection Plus 18/06/2015 13

  14. Easy to manage Extremely easy to manage, with no maintenance or infrastructure required in the customer's network. Easy to maintain • No specific infrastructure required to host the solution. • Your IT team can focus on more productive tasks. Easy to protect remote users • Each endpoint communicates with the cloud. • Roadwarriors and remote office are protected naturally. • No need for special installations or configurations. Easy to deploy • Multiple deployment methods. • Automatic uninstallers for other antivirus solutions. • Easy setup. Panda Endpoint Protection Plus 18/06/2015 14

  15. Resources and infrastructure required Panda Endpoint Protection Plus 18/06/2015 15

  16. NO ADDITIONAL INFRASTRUCTURE REQUIRED As a cloud-based service, all you need is an Internet connection and browser to access the console. SMOOTH LEARNING CURVE Intuitive and simple interface, with the most frequently used options at a click. ULTRA-LIGHT AGENT Low impact on system performance. Barely noticeable memory and CPU usage. Minimum bandwidth usage. Panda Endpoint Protection Plus 18/06/2015 16

  17. Thank You!

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend