WatchGuard Panda Endpoint Protection Plus
Manage the security of your IT infrastructure
Modules are available: Panda Patch Management, Panda Full Encryption, Panda Adaptive Defense, Panda Adaptive Defense 360
Our Price: Request a Quote
Minimum 11 quantity
Our Price: Request a Quote
Minimum 26 quantity
Our Price: Request a Quote
Minimum 51 quantity
Our Price: Request a Quote
Minimum 101 quantity
Our Price: Request a Quote
Minimum 251 quantity
Our Price: Request a Quote
Minimum 501 quantity
Our Price: Request a Quote
Minimum 1001 quantity
Our Price: Request a Quote
Minimum 3000 quantity
Our Price: Request a Quote
Our Price: Request a Quote
Minimum 11 quantity
Our Price: Request a Quote
Minimum 26 quantity
Our Price: Request a Quote
Minimum 51 quantity
Our Price: Request a Quote
Minimum 101 quantity
Our Price: Request a Quote
Minimum 251 quantity
Our Price: Request a Quote
Minimum 501 quantity
Our Price: Request a Quote
Minimum 1001 quantity
Our Price: Request a Quote
Minimum 3000 quantity
Our Price: Request a Quote
Click here to jump to more pricing!
Please Note: All Prices are Inclusive of GST
Overview:
Every day, over 350,000 new malicious programs (malware) and potentially unwanted applications (PUA) are registered.1 Hackers are targeting vulnerable endpoints, where enterprises store their most valuable assets. The reason? As is so often the case, for economic gain.
Enterprises are increasingly dependent of new technologies, and are thus exposed to new kinds of malware that endanger their security. This, of course, requires security approaches that reduce the attack surface.
EVOLUTION OF ENTERPRISE IT ENVIRONMENTS
Over the last few years, the evolution of technology, along with the widespread use of the Internet, mobile devices, and Cloud-based storage and apps, have all led to a real revolution in the corporate environment. This revolution, however, isn't without risks. While these advantages are a boost for enterprises, these same advantages are also leveraged by cyber criminals.
The increase in the number of cyber attacks is down to the increased value of the digital assets stored by companies. This also means that cyber criminals see a potential for themselves to increase their economic returns. Malware and ransomware have become some of the most prevalent threats, although paradoxically, the direct costs are not the main problem - rather, it is the downtime they cause. This is forcing enterprises to adopt measures to improve their security posture.
PROTECT YOUR COMPANY AGAINST MALWARE AND RANSOMWARE
Panda Endpoint Protection Plus is a complete, advanced security solution for desktops, laptops and servers. It centrally manages the security of endpoints both inside and outside the corporate network.
This service provides a set of EPP technologies to control malware, ransomware and threats that leverage unknown (zero day) vulnerabilities. There is no need to install or maintain new hardware resources on the enterprise's infrastructure. Moreover, the lightweight agent has no impact on endpoint performance and is accessible via a single web console, simplifying security management and increasing operational efficiency.
Benefits:
Multi-Platform Security
- Security against unknown advanced threats: detects and blocks malware, trojans, phishing and ransomware.
- Security for all attack vectors: browsers, email, file systems, and external devices connected to endpoints.
- Automatic analysis and disinfection of computers. Behavioral analysis to detect known and unknown malware.
- Security for Windows systems, Linux, macOS, Android and virtual environments (VMware, Virtual PC, MS Hyper-V, Citrix) - as well as for both persistent and non-persistent virtualization infrastructure (VDI).
Increased Productivity
- Panda Endpoint Protection Plus provides anti-spam protection for Exchange servers in order to improve user productivity and increase the security of all computers on the network.
- It monitors and filters web traffic, preventing employees from engaging in unproductive behaviors or falling victim to security threats such as bots or phishing.
- No specific infrastructure or maintenance is required; the IT department can focus on more important tasks.
Simplify Management
- Easy to maintain: no specific infrastructure required to host the solution; the IT department can focus on more important tasks.
- Easy to protect remote users: each computer protected with Panda Endpoint Protection Plus communicates with the Cloud; remote users and offices are protected quickly and easily, with no additional installations.
- Easy to deploy: multiple deployment methods, with automatic uninstallers for competitors' products to facilitate rapid migration from third-party solutions.
CENTRALIZED ENDPOINT SECURITY
Includes centralized management of security and product updates for all workstations and servers on the corporate network. Manage the protection of Windows, Linux, macOS and Android devices from a single web-based administration console.
MALWARE AND RANSOMWARE PROTECTION
Panda Endpoint Protection Plus analyzes behaviors and hacking techniques to detect and block both known and unknown malware, as well as ransomware, trojans and phishing. Moreover, Malware Freezer freezes detected malware for seven days and, in the event of a false positive, automatically restores the affected file to the system.
ADVANCED DISINFECTION
In the event of a security breach, Panda Endpoint Protection Plus allows enterprises to quickly restore affected computers to the state they were in before the infection with advanced disinfection tools and quarantine, which stores suspicious and deleted items. It also allows administrators to remotely restart workstations and servers to ensure they have the latest product updates installed.
MONITORING AND WEB FILTERING
Detailed, real-time network security monitoring via comprehensive dashboards and easy-to-interpret graphs.
Web filtering increases productivity in the company, and monitors activity to prevent access to dangerous or unproductive URLs.
SPAM, VIRUS AND CONTENT FILTERING
Panda Endpoint Protection Plus scans Exchange servers for viruses, hacking tools, and potentially unwanted programs. It increases user productivity and security, blocking spam, and malicious emails and scams.
CENTRALIZED DEVICE CONTROL
Stop malware and information leaks by blocking entire device categories (flash drives, USB modems, webcams, DVD/CD, etc), whitelisting devices or configuring read-only, write-only, and read-and-write access permissions, and blocking any activities that could be considered a risk.
FAST, FLEXIBLE INSTALLATION
Deploy the protection via email with a download URL, or silently to selected endpoints via the solution's distribution tool. MSI installer compatible with third-party tools (Active Directory, Tivoli, SMS, etc).
ISO 27001 AND SAS 70 COMPLIANT GUARANTEED 24/7 AVAILABILITY
Solution is hosted on Aether, the platform with complete data protection guaranteed. Our data centers are ISO 27001 and SAS 70 certified, allowing customers to avoid costly service outages and malware infections.
CLOUD MANAGEMENT PLATFORM - Aether Platform
The Cloud platform Aether and its management console, shared by all of Panda Security's endpoint solutions, optimize the management of advanced, adaptive security, both inside and outside the network. Designed for minimum complexity and maximum flexibility, granularity and scalability.
Achieve More In Less Time. Easy Implementation
- Deployment, installation and configuration in minutes. Maximum value from day one.
- Single lightweight agent for all products and all systems (Windows, macOS, Linux and Android).
- Automatic discovery of unprotected endpoints. Remote installation.
- Proprietary proxy and repository/cache technologies. Optimized communication, even with endpoints with no Internet connection.
Simplified Operations Adapts To Your Organization
- Intuitive web console. Flexible, modular management that reduces total cost of ownership.
- Users with full or restricted permissions and visibility. Activity audits.
- Security policies by endpoints and by groups. Predefined or custom roles.
- Hardware and software inventory, and changelog.
Easy Implementation of Security and Management Capacities Over Time
- No new infrastructure needed to deploy modules. No deployment costs.
- Communication with endpoints in real time from single web management console.
- Detailed reports, dashboards and indicators for each module.
Modules:
Panda Patch Management
Vulnerability Assessment and Patch Management
Patch Management is an easy-to-use solution for managing vulnerabilities in operating systems and third-party applications on Windows workstations and servers. It covers all the patch management processes including discovering, identifying, assessing, reporting, managing, deploying installations and remediating security risks
- Reduce the attack surface, contain and mitigate vulnerability exploitation attacks, while strengthening your organization's prevention and containment capabilities.
- Centralized and real-time visibility into the security status of software vulnerabilities, missing patches, updates and unsupported (EOL) software.
- Audit, monitor and prioritize operating system and application updates.
Panda Full Encryption
Protect Data with Encryption
Panda Full Encryption is the first line of defense to protect your data in a simple and effective way. It is a full-volume encryption solution that strengthens security against unauthorised access using established authentication mechanisms. Data encryption minimizes data exposure and provides an additional layer of security and control to your organization
- Automatically encrypts and decrypts disks without impacting end users.
- Centrally manages the recovery keys stored on our Cloud-based management platform.
- Prevents loss, theft and unauthorised access to data.
Panda Adaptive Defense
Intelligent Endpoint Detection and Response
Intelligent EDR that automates the detection, classification and response to all the endpoint activity. Automatically detects suspicious behaviors to block and respond to breaches, malware and advanced threats.
Its technology is based on the Zero-Trust Application Service, which provides full and accurate visibility on endpoints, applications and users and denies any suspicious execution.
Panda Adaptive Defense 360
Advanced Security to Stop Breaches
Unified Endpoint Protection (EPP) and Endpoint Detection and Response (EDR) capabilities, with our unique Zero-Trust Application Service and Threat Hunting Service in one single solution, to effectively detect and classify 100% of processes running on all the endpoints within your organization.
Cloud-delivered endpoint prevention, detection, containment and response technologies against advanced threat, zero-day malware, ransomware, phishing, in-memory exploits and malware-less attacks. It also provides IDS, firewall, device control, email protection, URL & content filtering capabilities.
Particulars | Panda Adaptive Defense | Panda Adaptive Defense 360 |
---|---|---|
Lightweight cloud-based agent | ✓ | ✓ |
Real-time endpoint monitoring | ✓ | ✓ |
Collective Intelligence lookups in real-time | ✓ | ✓ |
Cloud-based big data Analytics | ✓ | ✓ |
Zero-Trust App Service: Pre-execution, execution and post-execution | ✓ | ✓ |
In memory behavior anti-exploits | ✓ | ✓ |
Behavioral IOA detection | ✓ | ✓ |
Protection of systems when files are created | ✓ | |
IDS, Firewall and Device Control | ✓ | |
Web browsing and Email protection | ✓ | |
Category-based URL filtering | ✓ | |
Exchange server protection: Antispam and content filtering | ✓ |
Documentation:
Download the WatchGuard Panda Endpoint Protection Plus Datasheet (.PDF)
Pricing Notes:
- All Prices are Inclusive of GST
- Pricing and product availability subject to change without notice.
Our Price: Request a Quote
Minimum 11 quantity
Our Price: Request a Quote
Minimum 26 quantity
Our Price: Request a Quote
Minimum 51 quantity
Our Price: Request a Quote
Minimum 101 quantity
Our Price: Request a Quote
Minimum 251 quantity
Our Price: Request a Quote
Minimum 501 quantity
Our Price: Request a Quote
Minimum 1001 quantity
Our Price: Request a Quote
Minimum 3000 quantity
Our Price: Request a Quote
Our Price: Request a Quote
Minimum 11 quantity
Our Price: Request a Quote
Minimum 26 quantity
Our Price: Request a Quote
Minimum 51 quantity
Our Price: Request a Quote
Minimum 101 quantity
Our Price: Request a Quote
Minimum 251 quantity
Our Price: Request a Quote
Minimum 501 quantity
Our Price: Request a Quote
Minimum 1001 quantity
Our Price: Request a Quote
Minimum 3000 quantity
Our Price: Request a Quote
Minimum 51 quantity
Our Price: Request a Quote
Minimum 101 quantity
Our Price: Request a Quote
Minimum 501 quantity
Our Price: Request a Quote
Minimum 1001 quantity
Our Price: Request a Quote
Minimum 3001 quantity
Our Price: Request a Quote
Minimum 5001 quantity
Our Price: Request a Quote
Minimum 10001 quantity
Our Price: Request a Quote
Minimum 51 quantity
Our Price: Request a Quote
Minimum 101 quantity
Our Price: Request a Quote
Minimum 501 quantity
Our Price: Request a Quote
Minimum 1001quantity
Our Price: Request a Quote
Minimum 3001 quantity
Our Price: Request a Quote
Minimum 5001 quantity
Our Price: Request a Quote
Minimum 10001 quantity
Our Price: Request a Quote
Our Price: Request a Quote
Our Price: Request a Quote
Minimum 51 quantity
Our Price: Request a Quote
Minimum 51 quantity
Our Price: Request a Quote
Minimum 101 quantity
Our Price: Request a Quote
Minimum 101 quantity
Our Price: Request a Quote
Minimum 501 quantity
Our Price: Request a Quote
Minimum 501 quantity
Our Price: Request a Quote
Minimum 11 quantity
Our Price: Request a Quote
Minimum 26 quantity
Our Price: Request a Quote
Minimum 51 quantity
Our Price: Request a Quote
Minimum 101 quantity
Our Price: Request a Quote
Minimum 251 quantity
Our Price: Request a Quote
Minimum 501 quantity
Our Price: Request a Quote
Minimum 1001 quantity
Our Price: Request a Quote
Minimum 3001 quantity
Our Price: Request a Quote
Minimum 11 quantity
Our Price: Request a Quote
Minimum 26 quantity
Our Price: Request a Quote
Minimum 51 quantity
Our Price: Request a Quote
Minimum 101 quantity
Our Price: Request a Quote
Minimum 251 quantity
Our Price: Request a Quote
Minimum 501 quantity
Our Price: Request a Quote
Minimum 1001 quantity
Our Price: Request a Quote
Minimum 3001 quantity
Our Price: Request a Quote
Minimum 11 quantity
Our Price: Request a Quote
Minimum 26 quantity
Our Price: Request a Quote
Minimum 51 quantity
Our Price: Request a Quote
Minimum 101 quantity
Our Price: Request a Quote
Minimum 251 quantity
Our Price: Request a Quote
Minimum 501 quantity
Our Price: Request a Quote
Minimum 1001 quantity
Our Price: Request a Quote
Minimum 3001 quantity
Our Price: Request a Quote
Minimum 11 quantity
Our Price: Request a Quote
Minimum 26 quantity
Our Price: Request a Quote
Minimum 51 quantity
Our Price: Request a Quote
Minimum 101 quantity
Our Price: Request a Quote
Minimum 251 quantity
Our Price: Request a Quote
Minimum 501 quantity
Our Price: Request a Quote
Minimum 1001 quantity
Our Price: Request a Quote
Minimum 3001 quantity
Our Price: Request a Quote