Panda Endpoint Protection...

14
1

Transcript of Panda Endpoint Protection...

Page 1: Panda Endpoint Protection Suitespandasecurity.s3.amazonaws.com/enterprise/solutions/pep/PEPA-EN… · Panda Endpoint Protection Suites Endpoint Security » Granular policy-based whitelisting,

1

Page 2: Panda Endpoint Protection Suitespandasecurity.s3.amazonaws.com/enterprise/solutions/pep/PEPA-EN… · Panda Endpoint Protection Suites Endpoint Security » Granular policy-based whitelisting,

Panda Endpoint Protection Suites

Index:

– A New Endpoint Environment– A New Endpoint Solution

Page 3: Panda Endpoint Protection Suitespandasecurity.s3.amazonaws.com/enterprise/solutions/pep/PEPA-EN… · Panda Endpoint Protection Suites Endpoint Security » Granular policy-based whitelisting,

A N E d i t E i tA New Endpoint Environment

Page 4: Panda Endpoint Protection Suitespandasecurity.s3.amazonaws.com/enterprise/solutions/pep/PEPA-EN… · Panda Endpoint Protection Suites Endpoint Security » Granular policy-based whitelisting,

The New Endpoint Reality

– Increasing Malware Risk

» 2M malware signatures identified monthlyg y

» 3rd party software now #1 malware attack vector

» 70% of all serious data loss incidents sparked by an insiderp y

– Ineffectiveness of Anti-Virus alone

» Increasing malware sophistication

» Less than 19% of malware newer than 30 days is detected

» 50% of IT professionals point to malware as the leading cause of rising endpoint TCO

Page 5: Panda Endpoint Protection Suitespandasecurity.s3.amazonaws.com/enterprise/solutions/pep/PEPA-EN… · Panda Endpoint Protection Suites Endpoint Security » Granular policy-based whitelisting,

Challenges of Endpoint Management

• IT Operations Challenges • IT Security Challenges

» Lack of Common Management Console

» Need for better accuracy

» User access rights (Local Admin)» Increasing Agent Bloat

» Increasing and costly back-end Integration

» Lack of Scalability

» Silos and insufficient collaboration bet een IT and b siness operations

» Lack of visibility and collaboration with IT security

between IT and business operations

Lack of integration across technologies is the #1 IT security riskIT security risk

Page 6: Panda Endpoint Protection Suitespandasecurity.s3.amazonaws.com/enterprise/solutions/pep/PEPA-EN… · Panda Endpoint Protection Suites Endpoint Security » Granular policy-based whitelisting,

A N E d i t S l tiA New Endpoint Solution

Page 7: Panda Endpoint Protection Suitespandasecurity.s3.amazonaws.com/enterprise/solutions/pep/PEPA-EN… · Panda Endpoint Protection Suites Endpoint Security » Granular policy-based whitelisting,

Panda Endpoint Protection Suites

Total Endpoint Management p g

Optimized IT Control

PandaPandaEndpoint Protection Endpoint Protection

SuitesSuites

PandaPandaEndpoint Protection Endpoint Protection

SuitesSuites

ReducedReduced Endpoint Complexity

Page 8: Panda Endpoint Protection Suitespandasecurity.s3.amazonaws.com/enterprise/solutions/pep/PEPA-EN… · Panda Endpoint Protection Suites Endpoint Security » Granular policy-based whitelisting,

Panda Endpoint Protection Suites

Total Endpoint Management

» Comprehensive solution suite that unifies IT operational and security functions

» Delivers a more effective defense n depth endpoint security» Delivers a more effective defense-n-depth endpoint security solution

» Simplifies endpoint system and agent management through a single console

» Centralizes policy management and reporting» Expands operational and security visibility» Expands operational and security visibility» Reduces technology complexity and integration costs» Flexible and modularly licensed best-of-breed application y pp

modules» Scalable and agile single-agent, single-server platform

architecturearchitecture

Page 9: Panda Endpoint Protection Suitespandasecurity.s3.amazonaws.com/enterprise/solutions/pep/PEPA-EN… · Panda Endpoint Protection Suites Endpoint Security » Granular policy-based whitelisting,

Panda Endpoint Protection Suites

Endpoint Operations Management

» Expanded visibility and control through comprehensive discovery of endpoints in both online and offline modes

» Heterogeneous O/S environment support for Linux (RHEL) Oracle» Heterogeneous O/S environment support for Linux (RHEL), Oracle Enterprise Linux, Microsoft, Mac

» Largest 3rd party application vulnerability content support including: Adobe, Microsoft, Apple and others

» Integrated Wake-on-LAN ensures effective policy management across online and offline machinesacross online and offline machines

» Power Management supports custom power policy definition and reporting

» Configuration Management NIST-validated solution, with comprehensive list of SCAP policiesM d t b li i t/ t f ffi i t di ti f» Mandatory baseline import/export for efficient syndication of baseline polices

Page 10: Panda Endpoint Protection Suitespandasecurity.s3.amazonaws.com/enterprise/solutions/pep/PEPA-EN… · Panda Endpoint Protection Suites Endpoint Security » Granular policy-based whitelisting,

Panda Endpoint Protection Suites

Endpoint Security

» Granular policy-based whitelisting, , blacklisting, and device policy distribution via roles and user groups

» Comprehensive discovery of all applications online and offline» Comprehensive discovery of all applications, online and offline machines, and removable media devices

» Proactive protection against Zero day threats via traditional p g ysignature-matching, DNA matching and SandBox technologies, combined with application whitelisting policy

Eff ti l l t l d t i t» Effective malware removal to ensure cleaned system environments

» Intelligent Whitelisting integrated workflow across antivirus, application control and patch management for efficient flexible andapplication control, and patch management for efficient, flexible and effective application white list policy management

» Flexible Trust Engine (graylisting) for change management across g (g y g) g gprocesses, paths, users, vendors

Page 11: Panda Endpoint Protection Suitespandasecurity.s3.amazonaws.com/enterprise/solutions/pep/PEPA-EN… · Panda Endpoint Protection Suites Endpoint Security » Granular policy-based whitelisting,

Panda Endpoint Protection Suites

• How do we make it efficient and simple?

Agile platform architecture

L i ti d i t t h l Leverage existing endpoint technology

Reduced integration and maintenance costs

I d d i t f Improved endpoint performance

More effective endpoint security

Page 12: Panda Endpoint Protection Suitespandasecurity.s3.amazonaws.com/enterprise/solutions/pep/PEPA-EN… · Panda Endpoint Protection Suites Endpoint Security » Granular policy-based whitelisting,

Panda Endpoint Protection Suites

• Agile Scalable Extensible and Customizable Extensible and Customizable Modular

• Secure Reduced threat landscape Reduced # of security incidents Reduced insider risk

• Compliant Reduced cost of compliance Reduced litigation risk Continuous policy management

• Optimal Greater collaboration between security and operations teams Greater collaboration between security and operations teams Enhanced IT visibility Trust centric change management Centralized Systems and Policy Managementy y g

Page 13: Panda Endpoint Protection Suitespandasecurity.s3.amazonaws.com/enterprise/solutions/pep/PEPA-EN… · Panda Endpoint Protection Suites Endpoint Security » Granular policy-based whitelisting,

Benefits

Endpoint Operations Endpoint SecurityIntelligent Whitelisting

Device Control

Asset Configuration Trusted

Patch Management

Application Control

Asset Management

Software Management

Power Management

Configuration Management

Trusted Change

Anti Virus/Spyware Windows FirewallManagement

g g

Reporting

R T diti l Whit li ti Ch ll Removes Traditional Whitelisting Challenges

Extends Initial AV and Patch investment

Delivers Comprehensive solution Delivers Comprehensive solution

Page 14: Panda Endpoint Protection Suitespandasecurity.s3.amazonaws.com/enterprise/solutions/pep/PEPA-EN… · Panda Endpoint Protection Suites Endpoint Security » Granular policy-based whitelisting,

Thank youThank you