Simple and light security solution Content 1. The problem of - - PowerPoint PPT Presentation

simple and light security solution content
SMART_READER_LITE
LIVE PREVIEW

Simple and light security solution Content 1. The problem of - - PowerPoint PPT Presentation

Simple and light security solution Content 1. The problem of malware in IT environments 2. What is Panda Endpoint Protection Plus? 3. Features and benefits 4. Resources and infrastructure required Panda Endpoint Protection Plus


slide-1
SLIDE 1

Simple and light security solution

slide-2
SLIDE 2

Content

1. The problem of malware in IT environments 2. What is Panda Endpoint Protection Plus? 3. Features and benefits 4. Resources and infrastructure required

18/06/2015 Panda Endpoint Protection Plus 2

slide-3
SLIDE 3

The problem of malware in IT environments

18/06/2015 Panda Endpoint Protection Plus 3

slide-4
SLIDE 4

Malware’s volume evolution

  • a. More than 200,000 new samples a day.
  • b. The volume of new malware samples

generated in 2014 represents 20% of all malware created in the last 20 years.

18/06/2015 Panda Endpoint Protection Plus 4

100 new samples detected every day

1369 new samples detected every day

More than 200,000 new samples detected every day

VIRUSES

SPYWARE BOTS TROJANS TARGETED ATTACKS ZERO-DAY ATTACKS DYNAMIC TROJANS

slide-5
SLIDE 5

Evolution of the business IT infrastructure

A more complex infrastructure to manage.

  • BYOD.
  • Roaming workers and remote offices.
  • Heterogeneous operating systems.
  • More software installed come more

vulnerabilities. Companies internal process more dependent on technology. Sizing IT departments without changes or downwards. GREATER VULNERABILITY AND MANAGEMENT COMPLEXITY

18/06/2015 Panda Endpoint Protection Plus 5

IT infrastructures evolution

Infrastructure Technology dependence IT

slide-6
SLIDE 6

18/06/2015 Panda Endpoint Protection Plus 6

Productivity

Email and Web browsing are the main gateway for malware and also two critical factors for productivity Email

  • Email criticality as a production tool
  • 95% of corporate email is infected or spam
  • Email is the most common attack method: it

is essential to be up-to-date with the latest protection technologies Browsing:

  • The most recent threats, like bots, phishing

and malicious active content attack users when they browse the Internet, then spread across corporate networks.

slide-7
SLIDE 7

What is Panda Endpoint Protection Plus?

18/06/2015 Panda Endpoint Protection Plus 7

slide-8
SLIDE 8

Panda Endpoint Protection Plus is the cloud-based solution that allows you to manage the security of all of the computers in your network and control user productivity at the lowest possible cost of ownership.

18/06/2015 Panda Endpoint Protection Plus 8 Centralized management through a simple Web browser and without needing

  • servers. Service

provided from the cloud. No need for technicians, an easy to manage service. Productive employees: no spam and no browsing unauthorized websites. Cross-platform and mobility. Complete protection: email, Internet, network and external devices.

slide-9
SLIDE 9

Features and benefits

18/06/2015 Panda Endpoint Protection Plus 9

slide-10
SLIDE 10

Cross-platform security

Benefits

18/06/2015 Panda Endpoint Protection Plus 10

Extremely light Easy to manage Maximum productivity

slide-11
SLIDE 11

Extremely light

All operations are performed in the cloud: impact on endpoint performance is virtually zero. Light on memory use.

  • Small signature files.
  • Real-time access to collective intelligence.
  • Cloud-based malware database.

Light on network use.

  • Download size reduced to a minimum.
  • Signatures shared among endpoints via P2P

technology: download once and share across the network. Light on processor use.

  • Detection intelligence transfered to the cloud.
  • Lower use of processor resources on the user's

endpoint.

18/06/2015 Panda Endpoint Protection Plus 11

slide-12
SLIDE 12

Covers all infection vectors in Windows, Linux, Mac OS X and Android computers. Security in all attack vectors.

  • Browsing, email and file system protection.
  • Control of devices connected to the PC.

Security against unknown threats

  • Anti-exploit technology prevents malware from

exploiting unknown software flaws to infect computers.

  • Behavioral analysis to detect unknown malware.

Security on all platforms.

  • Windows (from 2000 to 8.1).
  • Linux (Ubuntu certified, Red Hat, Debian, OpenSuse and

Suse).

  • Mac OS X (10.6 – 10.10).
  • Android (from 2.3).
  • Virtual engines (WMware, Virtual PC, MS Hyper-V, Citrix).

18/06/2015 Panda Endpoint Protection Plus 12

Cross-platform security

slide-13
SLIDE 13

18/06/2015 Panda Endpoint Protection Plus 13

Monitors and filters Web traffic and spam, allowing companies to focus on their business and forget about unproductive employee behavior. Website monitoring and filtering

  • Increases business productivity
  • Monitors Web browsing
  • Select the Web categories you consider

dangerous or unproductive during working hours

  • Compatible with any Web browser

No more saturated inboxes

  • Reduces the attack surface in Exchange servers

through content filtering

  • Increases security and user productivity with the

anti-malware and anti-spam engine, blocking junk mail and malicious messages

Maximum productivity

slide-14
SLIDE 14

Easy to manage

Extremely easy to manage, with no maintenance or infrastructure required in the customer's network. Easy to maintain

  • No specific infrastructure required to host the

solution.

  • Your IT team can focus on more productive

tasks. Easy to protect remote users

  • Each endpoint communicates with the cloud.
  • Roadwarriors and remote office are protected

naturally.

  • No need for special installations or

configurations. Easy to deploy

  • Multiple deployment methods.
  • Automatic uninstallers for other antivirus

solutions.

  • Easy setup.

18/06/2015 Panda Endpoint Protection Plus 14

slide-15
SLIDE 15

Resources and infrastructure required

18/06/2015 Panda Endpoint Protection Plus 15

slide-16
SLIDE 16

18/06/2015 Panda Endpoint Protection Plus 16

NO ADDITIONAL INFRASTRUCTURE REQUIRED

As a cloud-based service, all you need is an Internet connection and browser to access the console.

SMOOTH LEARNING CURVE

Intuitive and simple interface, with the most frequently used options at a click.

ULTRA-LIGHT AGENT

Low impact on system performance. Barely noticeable memory and CPU

  • usage. Minimum bandwidth usage.
slide-17
SLIDE 17

Thank You!