Panda Endpoint Protection – 3 Year – 51 to 100 licenses
Rp1.231.545
Multi-Platform Security
- Security against unknown advanced threats: detects and blocks malware, trojans, phishing and ransomware.
- Security for all attack vectors: browsers, email, file systems, and external devices connected to endpoints.
- Automatic analysis and disinfection of computers.
- Behavioral analysis to detect known and unknown malware.
- Cross-platform security: Windows systems, Linux, macOS, Android and virtual environments (VMware, Virtual PC. MS Hyper-V, Citrix). Management of licenses belonging to both persistent and non-persistent virtualization infrastructure (VDI).
Simplify Management
- Easy to maintain: no specific infrastructure required to host the solution; the IT department can focus on more important tasks.
- Easy to protect remote users: each computer protected with Panda Endpoint Protection communicates with the Cloud; remote offices and users are protected quickly and easily, with no additional installations.
- Easy to deploy: multiple deployment methods, with automatic uninstallers for competitors’ products to facilitate rapid migration from third-party solutions.
- Smooth learning curve: intuitive, simple web-based management interface, with most-frequent options one click away.
Lower Impact On Performance
- The agent has minimal network, memory and CPU usage, since all operations are performed in the Cloud.
- Panda Endpoint Protection requires no installation, management or maintenance of new hardware resources in the organization’s infrastructure.
CENTRALIZED DEVICE SECURITY
Centralized management of security and product updates for all workstations and servers on the corporate network. Manage the protection of Windows, Linux, macOS and Android devices from a single web-based administration console.
MALWARE AND RANSOMWARE PROTECTION
Panda Endpoint Protection analyzes behaviors and hacking techniques to detect and blocks both known and unknown malware, as well as ransomware, trojans and phishing.
ADVANCED DISINFECTION
In the event of a security breach, Panda Endpoint Protection allows enterprises to quickly restore affected computers to the state they were in before the infection with advanced disinfection tools and quarantine, which store suspicious and deleted items.
It also allows administrators to remotely restart workstations and servers to ensure they have the latest product updates installed.
REAL-TIME MONITORING AND REPORTS
Detailed, real-time security monitoring is delivered via comprehensive dashboards and easy-to-interpret graphs. Reports are automatically generated and delivered on protection status, detections and improper use of devices.
GRANULAR CONFIGURATION OF PROFILES
Assign specific protection policies by user profiles, guaranteeing the application of the most appropriate policy for every group of users.
CENTRALIZED DEVICE CONTROL
Stop malware and information leaks by blocking entire device categories (flash drives, USB modems, webcams, DVD/CD, etc), whitelisting devices or configuring read-only, write-only, and read-and-write access permissions.
FAST, FLEXIBLE INSTALLATION
Deploy the protection via email with a download URL, or silently deploy to selected endpoints via the solution’s distribution tool. MSI installer is compatible with third-party tools (Active Directory, Tivoli, SMS, etc).
MALWARE FREEZER
Malware Freezer quarantines detected malware for seven days and, in the event of a false positive, automatically restores the affected file to the system.
ISO 27001 AND SAS 70 COMPLIANT GUARANTEED 24/7 AVAILABILITY
Solution is hosted on Aether platform with complete data protection guaranteed. Our data centers are ISO 27001 and SAS 70 certified, allowing customers to avoid costly service outages and malware infections.
CLOUD MANAGEMENT PLATFORM – Aether Platform
The Cloud platform Aether and its management console, shared by all of Panda Security’s endpoint solutions, optimize the management of advanced, adaptive security, both inside and outside the network. It is designed for minimum complexity and maximum flexibility, granularity and scalability.
Achieve More In Less Time. Easy Implementation
- Deployment, installation and configuration in minutes. Maximum value from day one.
- Single lightweight agent for all products and all systems (Windows, macOS, Linux and Android).
- Automatic discovery of unprotected endpoints. Remote installation.
- Proprietary proxy and repository/cache technologies. Optimized communication, even with endpoints with no Internet connection.
Simplified Operations Adapts To Your Organization
- Intuitive web console. Flexible, modular management that reduces total cost of ownership.
- Role-based users with with full or restricted permissions. Activity audits.
- Security policies by endpoints and by groups. Predefined or custom roles.
- Hardware and software inventory, and changelog.
Easy Implementation of Security and Management Capacities Over Time
- No new infrastructure needed to deploy modules. No deployment costs.
- Communication with endpoints in real time from single web management console.
- Dashboards and indicators for each module