PANDA CLOUD PROTECTION SaaS Security for endpoints, email and Web traffic:  The complete, secure, light and simple solution
SECURITY CONERNS WHAT IS PANDA CLOUD PROTECTION?  ¿HOW DOES  IT WORK? CLIENTS BENEFITS FEATURES INDEX
SECURITY CONERNS WHAT IS PANDA CLOUD PROTECTION?  ¿HOW DOES  IT WORK? CLIENTS BENEFITS FEATURES INDEX
CYBER CRIMES  keep increasing: Hackers try to access into companies PCs to  steal confidential, proprietary, sensitive dat...
2004 2006 2007 2008 2009 2010 * 60  million Source: Pandalabs MARKET SITUATION EXPONTENTIAL INCREASE  Malware samples rece...
MALWARE DESIGNED FOR ECOMONIC GAIN Malware detected in  2009 Adware Spyware T rojan Worm Others source: Pandalabs 31,05% 5...
WEB 2.0  CHALLANGES Security Threats  are no longer static:  Stealth, polymorphic threats. Data Leakage:  Read only copies...
New Organizational  CHALLENGES: Distributed   workforces   exacerbate security issues by lessening central control Road wa...
Productivity   Loss : “ Non-work-related Internet  surfing results in an estimated 40% productivity loss each year for Ame...
SECURITY AND BUSINESS CONTINUITY Email Servers Admin Security   Concerns Complexity and cost in managing antimalware and a...
Traditional antivirus require  too much time  and effort  from SMBs TIME Additional hardware  and software infrastructure ...
Company Pain points Who suffers the consequences? SMALL AND MEDIUM BUSINESS REMOTE OFFICE  BRANCH OFFICE  HOME OFFICE - No...
Custom Mountain Bike PLC <ul><ul><ul><li>Manufacturer of custom Mountain Bikes </li></ul></ul></ul><ul><ul><ul><li>Revenue...
<ul><ul><ul><li>Network, Hardware and Software Manager </li></ul></ul></ul><ul><ul><ul><li>Web Manager of the new On-line ...
SECURITY CONERNS WHAT IS PANDA CLOUD PROTECTION?  ¿HOW DOES  IT WORK? CLIENTS BENEFITS FEATURES INDEX
WHAT IS SaaS? Security as a Service  (SaaS*) means delivering traditional security applications as an Internet-based servi...
Panda Cloud Office Protection (SaaS)  vs.  Software/Appliance Opportunity : SaaS PANDA CLOUD PROTECTION Hosted by Panda , ...
SaaS in today's businesses Opportunity : SaaS
SaaS  Security Markets Opportunity : SaaS
WHAT? Complete  SaaS   security   suite that  protects all the threat entry points :  endpoints, email and web traffic Hea...
Panda Cloud Protection Portfolio PANDA CLOUD OFFICE PROTECTION PANDA CLOUD OFFICE PROTECTION Complete  SaaS   security   s...
Panda Cloud Protection Panda Cloud Office Protection  <ul><li>15   protection   modules </li></ul><ul><li>Collective Intel...
COLLECTIVE INTELLIGENCE Unmatched  Security Data Processing Collective Intelligence Daily Intelligence at Panda Research 1...
SECURITY CONERNS WHAT IS PANDA CLOUD PROTECTION?  ¿HOW DOES  IT WORK? CLIENTS BENEFITS FEATURES INDEX
CLIENTS BENEFITS Robust protection  for endpoints, email and web with  15 modules No  initial investment , maintenance, no...
Clients Benefits <ul><ul><li>Proactive  anti-malware protection based on Collective Intelligence  for  PCs, laptops and se...
How does Panda Cloud Protection solve CEO’s Concern? Liquidity Reduce Fixed cost Increase Productivity IT is focus on Core...
How does Panda Cloud Protection solve Tim’s Concern? Improve Security & Risk Management Reduce Fixed and Operational Costs...
SECURITY CONERNS WHAT IS PANDA CLOUD PROTECTION?  ¿HOW DOES  IT WORK? CLIENTS BENEFITS FEATURES INDEX
How Does It Work? OFFICE 1 OFFICE 2 CLIENT 1  Instalation Option 1 . Users receive an email with a link, and click on it t...
How Does It Work?
INTERNET How Does It Work? X X
INTERNET CONFIDENTIAL Real-time dashboard Real-time transaction detail Location, department or application view Visibility...
SECURITY CONERNS WHAT IS PANDA CLOUD PROTECTION?  ¿HOW DOES  IT WORK? CLIENTS BENEFITS FEATURES INDEX
Panda Cloud Protection Portfolio PANDA CLOUD OFFICE PROTECTION PANDA CLOUD OFFICE PROTECTION completo conjunto de  solucio...
PANDA CLOUD OFFICE PROTECTION <ul><ul><li>Proactive protection for PCs, laptops and servers. Personal Firewall with centra...
Panda Cloud Portfolio PANDA CLOUD EMAIL PROTECTION <ul><ul><li>Perimetral Antivirus and Antispam. Connection filters, Filt...
Panda Cloud Protection PANDA CLOUD INTENET PROTECTION <ul><ul><li>Antivirus Web, anti-malware,  Protection against  Botnet...
<ul><li>Technology partners  </li></ul>Why Panda Security?
Panda Security THANK YOU!!!
Upcoming SlideShare
Loading in …5
×

Panda Cloud Services

708 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
708
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
5
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Antivirus products require too much time and effort for small and medium sized companies. Once they buy the antivirus, they have to invest time and effort in: Additional hardware such as servers to host a centralized console with the attached services and databases. Additional supporting software licenses such as database software to run protection’s reports or configuration. Complicated security management requires dedicated and skilled personnel - not focused on the core business- to manage and control protection. Many SMBs do not want these hassles because all these tasks distract them from their core business.
  • SMBs understand full well that they face the same risks and regulations as large organizations. The increasing number of threats makes their protection needs more complex: There are more threats than ever (PandaLabs received more malware last year than in the previous 16 years combined) Malware is silent and more difficult to combat as long as it remains hidden , causing identity theft, financial and productivity losses and other malicious action. This malware landscape that organizations have to face requires a full set of maximized malware detection capabilities. When the SMBs implement a security solution, they have to choose one that provides adequate protection and that adapts to their specific needs . In many cases, their limited resources are not enough to obtain the security levels they require. Small and mid-sized businesses usually lack skilled resources for protecting and managing the security of their networks. They tend to invest all possible resources in their core business activities and this prevents them from assigning an adequate part of their budget to IT security. Most of them invest just enough to get by. They also need a continued monitoring system in order to reduce risk. Remote and branch offices are often geographically distributed and therefore need to be managed remotely from a centralized point. They also need to simplify security management as much as possible and have a continued monitoring service with reduced bandwidth consumption . Home Offices have nobody in charge of security management and they have no budget for security management.
  • IN CHARGE OF Network management Hardware and Software maintenance Database programming Mail server maintenance and security patching Problem solving hardware and software issues Software installation, updating and deployment Security policy, setup and maintenance (server, database, installation, upgrades) Web. The new Challenge of On-line Order System. Negotiation with vendors IT Responsible for the new Office PROBLEMS 20-30% of time putting out fires Past 2 months has spent 3 days to reinstall 6 computers  Rootkit Administration computer found to be infected with keylogger Had to contact the bank and rescan the network Commercial Rep. are using retail antivirus Uncertain about state of updates for the mobile and remote users Once a week has to travel to remote offices for maintenance (hardware, software and security) Cannot keep up with security, admin. &amp; development tasks Has to deploy
  • 8 Security as a Service (SaaS) means delivering traditional security applications as an Internet-based service to customers. Subscription service: Since SaaS is a subscription-based service (service vs. product), vendors have greater focus on quality of service and support. This forces to stay on top of quality, maintenance and service. Hosted service: With SaaS, multiple customers use the Internet to make use of a single copy of an application that runs on an Internet-connected server. This requires designing the software to support such multi-tenancy while keeping each customer’s data separate and secure. Being a Hosted service it doesn’t require infrastructure at the customer site. Infrastructure investments and expenses in maintenance, dimensioning when company grows, etc are not needed. High availability 24x7 That means companies must provide high availability 24x7 uptime. To do this, the SaaS company must have servers in a worldclass data center that has redundant UPS power, generator backup, fully meshed Tier 1 connectivity to multiple backbone providers and in-depth 24x7 monitoring, among other features. They must respond immediately to any hardware, software or database administration issues. In addition, SaaS customers demand 24x7 customer support. Web-based interface The application ’s interface is web-based enabling the end-customer access the application through the internet anytime 24x7 from anywhere. Always updated Because SaaS software updates only require changes on a single platform at centrally located servers, rolling out updates is much simpler. Short improvements cycle SaaS companies can constantly see how their users are using their applications in real time. They immediately analyze what is working well and what isn’t. Successful companies use this information to respond quickly by implementing software updates with a shorter cycle than is possible with on premise software. Low TCO The automatic upgrades delivered by SaaS programs result in a lower total cost of ownership (TCO) due to the fact that SaaS eliminates much of the IT effort to solution upgrades. In fact, compared to traditional on-premise installations, SaaS applications have an overall 20%-40% lower TCO, allowing companies to reallocate resources in other areas. Rapid installs also translate into a quicker return on investment.
  • IN CHARGE OF Network management Hardware and Software maintenance Database programming Mail server maintenance and security patching Problem solving hardware and software issues Software installation, updating and deployment Security policy, setup and maintenance (server, database, installation, upgrades) web. The new Challenge of On-line Order System. Negotiation with vendors IT Responsible for the new Office PROBLEMS 20-30% of time putting out fires Past 2 months has spent 3 days to reinstall 6 computers  Rootkit Administration computer found to be infected with keylogger Had to contact the bank and rescan the network Commercial Rep. are using retail antivirus Uncertain about state of updates for the mobile and remote users Once a week has to travel to remote offices for maintenance (hardware, software and security) Cannot keep up with security, admin. &amp; development tasks Has to deploy
  • Is it 18 terabytes or 25?
  • Robust protection Proactive anti-malware protection based on Collective Intelligence for PCs, laptops and servers which detects and eliminates viruses, worms, trojans, spyware, adware, rootkits, bots, hacking tools, unwanted programs and phishing . Locally or centrally managed personal Firewall. Updates are automatic and transparent , ensuring immediate protection with the latest technologies against the latest threats.   Minimal costs No initial investment or hardware and software maintenance . Costs are predictable . No IT specialized, dedicated resources are required. There are no upgrade costs as these are completely automatic .   Minimal resource consumption Panda Security’s light, proactive technologies along with Collective Intelligence minimize resource consumption . Optimized update technologies ensure minimal bandwidth usage.   Easy to use, easy to maintain Startup is immediate , after minimal Web-based configuration, allowing companies to enjoy maximum protection in a matter of minutes, no matter where users are located . Infrastructure maintenance and updates are directly managed by Panda Security . Installation, configuration, reports and security management is performed centrally , from anywhere through a Web console available 24x7   Control Profile-based security policies. Centrally monitor in real time of endpoint security status, scheduled scans results and malware and network attacks detections Detections alerts via email Detection, status and executive reports for the all endpoints or by groups Global security audit   Regulatory compliance Centralized security management , reports , profile-based security policies and periodic audits aid compliance with regulations: SOX, PCI, HIPAA.   Green IT Reduced energy bills, as no dedicated servers are required. Reduced mail server processing, as well as a reduction in usage of bandwidth and local computer resources. Reduced environmental impact through lower energy consumption (CO 2 emissions) Improved corporate image - environmental responsibility
  • Delay or no need to purchase new hardware Server  Less processing needs means delay purchase or no purchase of new infrastructure or services PCs  PCs no longer need to upgrade memory or CPU Change Fixed for Variable Costs No upfront costs  Pay as you go  Improved Liquidity SaaS can be expensed instead of depreciated
  • IN CHARGE OF Network management Hardware and Software maintenance Database programming Mail server maintenance and security patching Problem solving hardware and software issues Software installation, updating and deployment Security policy, setup and maintenance (server, database, installation, upgrades) Web. The new Challenge of On-line Order System. Negotiation with vendors IT Responsible for the new Office PROBLEMS 20-30% of time putting out fires Past 2 months has spent 3 days to reinstall 6 computers  Rootkit Administration computer found to be infected with keylogger Had to contact the bank and rescan the network Commercial Rep. are using retail antivirus Uncertain about state of updates for the mobile and remote users Once a week has to travel to remote offices for maintenance (hardware, software and security) Cannot keep up with security, admin. &amp; development tasks Has to deploy
  • La continuidad del negocio, factor crítico en la realidad económica actual, y el cumplimiento de regulaciones requieren sistemas de protección robustos, fiables y en continua evolución para bloquear todas las vías de entrada de malware.   Sin embargo, las empresas sufren continuos recortes presupuestarios y falta de recursos especializados , que hace imposible la implantación y mantenimiento de las medidas necesarias de seguridad.
  • Malware por pendrive Rootkits. Análisis en profundidad Inspección del tráfico por el firewall y detección de intrusos
  • Panda Cloud Services

    1. 1. PANDA CLOUD PROTECTION SaaS Security for endpoints, email and Web traffic: The complete, secure, light and simple solution
    2. 2. SECURITY CONERNS WHAT IS PANDA CLOUD PROTECTION? ¿HOW DOES IT WORK? CLIENTS BENEFITS FEATURES INDEX
    3. 3. SECURITY CONERNS WHAT IS PANDA CLOUD PROTECTION? ¿HOW DOES IT WORK? CLIENTS BENEFITS FEATURES INDEX
    4. 4. CYBER CRIMES keep increasing: Hackers try to access into companies PCs to steal confidential, proprietary, sensitive data or money. Security Concerns Small and medium-sized businesses face the same security problems threats as large companies Newer threats such as bots, phishing and malicious active content attack users as they use the Internet or email , and subsequently infect corporate networks. Cybercriminal takes advantage of the company’s infrastructure to execute their crimes : send SPAM, attack other businesses, install unwanted programs, etc.
    5. 5. 2004 2006 2007 2008 2009 2010 * 60 million Source: Pandalabs MARKET SITUATION EXPONTENTIAL INCREASE Malware samples received at PandaLabs 40 million 15 Mil X2 X10 Security Concerns
    6. 6. MALWARE DESIGNED FOR ECOMONIC GAIN Malware detected in 2009 Adware Spyware T rojan Worm Others source: Pandalabs 31,05% 59,53% 1.96% 2.93% 4.53% Malware and Spam affect all companies equally, regardless of company size Security Concerns
    7. 7. WEB 2.0 CHALLANGES Security Threats are no longer static: Stealth, polymorphic threats. Data Leakage: Read only copies of data no longer the problem, up to 80% of data leakage is done over the web (email, blogs, IM, Webmail, News Channels) Web Access Control : User created content boom. Web sites (networks, blogs, communities) are extremely dynamic, statically classifying them is no longer valid. Who accesses what and when? Bandwidth : 75%-90% of bandwidth is used for Web Traffic. New bandwidth hogs and risks (Streaming, P2P). The Internet is the tool of choice for nearly all companies today. Security Concerns
    8. 8. New Organizational CHALLENGES: Distributed workforces exacerbate security issues by lessening central control Road warriors: “I am hardly ever in the office”. Road warriors need personal and confidential data Remote office require additional solutions which decentralizes control and adds to TCO and maintenance overheads Teleworking: “I work from home”. Growing trend in working from home which adds more non-secure PCs to the problem. PCs used for personal use as well as professional. Managers: “I need to be constantly connected”. Managers using Smartphone, PDA devices . They deal with business critical data in non-secure environments Security Concerns
    9. 9. Productivity Loss : “ Non-work-related Internet surfing results in an estimated 40% productivity loss each year for American businesses” 1 Expensive and impractical solutions: Fragmented and partial security solutions decentralize control whilst increasing TCO and management overheads Saturated Bandwidth by non work related activities and applications further exacerbates productivity issues. 1 : Gartner Security Concerns BOTTOM LINE
    10. 10. SECURITY AND BUSINESS CONTINUITY Email Servers Admin Security Concerns Complexity and cost in managing antimalware and antispam at endpoints, email and web traffic Servers Database Servers X X X X X X X X X X X X X X
    11. 11. Traditional antivirus require too much time and effort from SMBs TIME Additional hardware and software infrastructure needed. Tight IT budget Complicated management requires dedicated and skilled personnel not focused on core business COSTS COMPLEXITY Security Concerns
    12. 12. Company Pain points Who suffers the consequences? SMALL AND MEDIUM BUSINESS REMOTE OFFICE BRANCH OFFICE HOME OFFICE - No budget for security management -No one in charge of security management ENTERPRISE - Lack of security-skilled resources -Tight IT budget - Manage geographically distributed offices - Low bandwidth consumption - Global Protection : Web, Email, Endpoints - 24x7 monitoring to reduce and manage risks - Exhaustive security control and enforcement of regulations (HIPAA, PCI, etc)
    13. 13. Custom Mountain Bike PLC <ul><ul><ul><li>Manufacturer of custom Mountain Bikes </li></ul></ul></ul><ul><ul><ul><li>Revenue of ₤ 560,000 in 2009 </li></ul></ul></ul><ul><ul><ul><li>27 employees. Factory + 3 remote off. + 7 Comm. Rep. </li></ul></ul></ul><ul><ul><ul><li>He is gaining Market Share, he is extending the business </li></ul></ul></ul><ul><li>CEO’s main concerns : </li></ul><ul><ul><ul><li>Liquidity </li></ul></ul></ul><ul><ul><ul><li>Reduce Fixed cost </li></ul></ul></ul><ul><ul><ul><li>Increase Productivity: On-line Order System </li></ul></ul></ul><ul><ul><ul><li>Open new office in a month </li></ul></ul></ul><ul><ul><ul><li>Ensure business continuity </li></ul></ul></ul>Case Study STEVE BROWN CEO
    14. 14. <ul><ul><ul><li>Network, Hardware and Software Manager </li></ul></ul></ul><ul><ul><ul><li>Web Manager of the new On-line Order System </li></ul></ul></ul><ul><ul><ul><li>IT Resp. for the new Office. No budget for Security Server </li></ul></ul></ul><ul><ul><ul><li>30% of time putting out fires </li></ul></ul></ul><ul><ul><ul><li>Cannot keep up with security & administrative tasks </li></ul></ul></ul>Tim’s main concerns : Improve Security: Factory, Remote Off. & Laptops. Complex management due to several gateways and roadwarriors Worry about the new threats in internet (rogueware, Web 2.0, etc) Reduce mail server load Reduce Fixed & Operational Cost Reduce Time in Security maintenance & travelling, and Focus on the business needs TIM “ THE IT GUY” Case Study
    15. 15. SECURITY CONERNS WHAT IS PANDA CLOUD PROTECTION? ¿HOW DOES IT WORK? CLIENTS BENEFITS FEATURES INDEX
    16. 16. WHAT IS SaaS? Security as a Service (SaaS*) means delivering traditional security applications as an Internet-based service to customers. SaaS main characteristics : Subscription service Hosted service High availability 24x7 Web-based interface Always updated Short improvements cycle Low TCO Opportunity : SaaS *Security as a Service applied to Security is also known as SecaaS by Gartner
    17. 17. Panda Cloud Office Protection (SaaS) vs. Software/Appliance Opportunity : SaaS PANDA CLOUD PROTECTION Hosted by Panda , light on client side Web Console 24/7 . No investment in HW/SW No dedicated resource needed One solution for entire organization Redirect traffic once and forget about it No maintenance for HW / SW, databases, updates, upgrades, outages Any user, any device, anytime from anywhere SOFTWARE/APPLIANCE On premise Installed locally Higher TCO Dedicated It recourses Fragment, multi single point solutions More complex. More time consuming HW and SW maintenance , databases, updates, outages.. Unmanaged, more complex to protect Infrastructure Console Cost IT resources Centralized Installation Ease of use Mobile users
    18. 18. SaaS in today's businesses Opportunity : SaaS
    19. 19. SaaS Security Markets Opportunity : SaaS
    20. 20. WHAT? Complete SaaS security suite that protects all the threat entry points : endpoints, email and web traffic Headquaters Road warriors Remote Office PANDA CLOUD PROTECTION Panda Cloud Protection <ul><li>HOW? </li></ul><ul><li>Delivery model Software as a Service (SaaS) </li></ul><ul><li>Real time connection to the Collective Intelligence </li></ul><ul><li>BENEFITS </li></ul><ul><li>Proactive and robust protection </li></ul><ul><li>Minimum costs </li></ul><ul><li>Minimum resources consumption </li></ul><ul><li>Easy to use, easy to maintain </li></ul>
    21. 21. Panda Cloud Protection Portfolio PANDA CLOUD OFFICE PROTECTION PANDA CLOUD OFFICE PROTECTION Complete SaaS security suite that protects all the threat entry points : endpoints, email and web traffic PANDA CLOUD PROTECTION PANDA CLOUD EMAIL PROTECTION PANDA CLOUD INTERNET PROTECTION PANDA CLOUD OFFICE PROTECTION <ul><li>PANDA CLOUD OFFICE PROTECTION </li></ul><ul><li>SaaS Security Solution for endpoints connected in real time to the Collective Intelligence </li></ul><ul><li>Uninterrupted protection for PCs, laptops and servers </li></ul><ul><li>PANDA CLOUD EMAIL PROTECTION </li></ul><ul><li>SaaS Security Solution for email traffic connected in real time to the Collective Intelligence </li></ul><ul><li>Elimates spam, known and unknown malware and phishing , before they reach the perimeter </li></ul><ul><li>PANDA CLOUD INTERNET PROTECTION </li></ul><ul><li>S aaS Security Solution for web traffic connected in real time to the Collective Intelligence </li></ul><ul><li>Protection against Internet threats , dynamic URLs access and Web 2.0 application control </li></ul><ul><li>Data loss prevention and bandwidth usage control </li></ul>0
    22. 22. Panda Cloud Protection Panda Cloud Office Protection <ul><li>15 protection modules </li></ul><ul><li>Collective Intelligence </li></ul><ul><li>Centralized Management </li></ul><ul><li>Unified Security Policies </li></ul><ul><li>Zero Infrastrucuture Management </li></ul>
    23. 23. COLLECTIVE INTELLIGENCE Unmatched Security Data Processing Collective Intelligence Daily Intelligence at Panda Research 100 MILLION - Unique Samples Processed 75.000 - Samples Received Daily 55.000 – Unique Samples Daily 52% of Malware “live” 24 hours 99.4% of all malware detected is managed by Collective Intelligence automatically Dedicated Research & Development team at PandaLabs monitors thousands of malware sites gathering 18 Terabytes of information Truprevent Antivirus Antimalware It is a matter of survival for AV vendors , who increasingly are looking for ways to reinvent themselves as their product struggle to thwart new type of infections Cloud-based, collective intelligence services are the next big thing for anti-malware I expect that every AV vendor will need to embrace an approach like this if they expect to survive Yankee Group
    24. 24. SECURITY CONERNS WHAT IS PANDA CLOUD PROTECTION? ¿HOW DOES IT WORK? CLIENTS BENEFITS FEATURES INDEX
    25. 25. CLIENTS BENEFITS Robust protection for endpoints, email and web with 15 modules No initial investment , maintenance, nor specialized resources Minimizes resource consumption at endpoint, network and email servers Automatic updates / upgrades Easy to use. Installation and management centralized and remote Anywhere availability 24/7 Web access control, dynamic URL filtering. Web 2.0 and bandwidth usage control Regulations compliance, data leak prevention and Green IT alligment Clients Benefits
    26. 26. Clients Benefits <ul><ul><li>Proactive anti-malware protection based on Collective Intelligence for PCs, laptops and servers, email and web traffic </li></ul></ul><ul><ul><li>Firewall, anti-spam, content filtering, web mail and email backup </li></ul></ul><ul><ul><li>Anti-spyware, protection against bots, phising, cross site scripting and other advanced Web 2.0 threats </li></ul></ul>Robust protection <ul><li>No initial investment . Costs are predictable </li></ul><ul><li>No hardware and software maintenance . No IT specialized resources </li></ul><ul><li>There are no upgrade costs as these are completely automatic and transparent </li></ul><ul><li>It reduces the time and resources by 80% in comparison with security appliances </li></ul>Minimal costs <ul><li>Collective Intelligence minimizes resource consumption </li></ul><ul><li>Optimized update technologies ensure minimal bandwidth usage </li></ul><ul><li>The elimination of non-productive traffic, before it reaches to the perimeter, optimizes network resources and reduces server workloads </li></ul>Minimal resource consumption <ul><ul><li>Startup is in a matter of minutes , regardless of users location </li></ul></ul><ul><li>Infrastructure maintenance and updates are managed by Panda Security </li></ul><ul><ul><li>Console available 24x7 from anywhere </li></ul></ul>Easy to use, easy to maintain <ul><li>Static and dynamic URL filtering </li></ul><ul><li>Control over access to Web 2.0 applications </li></ul><ul><li>Forensic analysis : Centralized nanologs and forensic functionalities </li></ul><ul><li>Control over access to the web and bandwidth use </li></ul>Comprehensive Security Control <ul><li>Data loss prevention (DLP) </li></ul><ul><li>Centralized security management , reports , profile-based security policies and periodic audits aid compliance with regulations: SOX, PCI, HIPAA </li></ul><ul><ul><li>Green IT : Reduced energy bills, environmental impact, Improved corporate image - environmental responsibility </li></ul></ul>Regulatory compliance & Green IT
    27. 27. How does Panda Cloud Protection solve CEO’s Concern? Liquidity Reduce Fixed cost Increase Productivity IT is focus on Core Business Processes Total cost in security has decreased in 50% No need for Security infrastructure Investment <ul><ul><li>Variable Costs proportional to number of employees </li></ul></ul>IT has reduced time in Security related tasks from 3 hours per day to one New Office and On-line Order System were ready as planned Ensure business continuity 24x7 active security service which does not interfere in the day-to-day business STEVE BROWN CEO Case Study
    28. 28. How does Panda Cloud Protection solve Tim’s Concern? Improve Security & Risk Management Reduce Fixed and Operational Costs Focus on Business Needs Maximum protection for endpoint, email and web traffic Centralized Security Management of the whole business HQ, remote offices and road warriors with the same security policies Periodical Malware Audits for prevention Web access control Business is protected against new web threats (Web 2.0, rogueware ) No Investment in hardware and software for security in the new Office Recycling servers for new Office Less bandwidth & resource consumption Reduce installation time . Simply Install and Manage No time in Server Maintenances , Updating/Upgrading Less Time in Security Management & cleaning infections Reduce Email Server Load Less email traffic on the network Efficient anti-spam filtering TIM “ THE IT GUY” Case Study
    29. 29. SECURITY CONERNS WHAT IS PANDA CLOUD PROTECTION? ¿HOW DOES IT WORK? CLIENTS BENEFITS FEATURES INDEX
    30. 30. How Does It Work? OFFICE 1 OFFICE 2 CLIENT 1 Instalation Option 1 . Users receive an email with a link, and click on it to install. Instalation Option 2 . Push instalation with our distribution tool. Instalation Option 3 . You can also generation an inbstalation package and distribute it through login-script, Active Directory, Tivoli, SMS, LanDesk, etc Transparent updates from nearest computers. Minimizes broadband consumption.
    31. 31. How Does It Work?
    32. 32. INTERNET How Does It Work? X X
    33. 33. INTERNET CONFIDENTIAL Real-time dashboard Real-time transaction detail Location, department or application view Visibility into Web 2.0 Applications How Does It Work? Overall usage for Social Networks Top applications for: guest Social Networks used Webmails sent and viewed Webmail Threats like Botnets and Malicious code Transaction level details of threats for user : Admin Internet usage by Location Top Internet Users Usage trend by department “ Simply Unbelievable! The information I could not get at all before, or it took days to pull it out of multiple massive logs, is instantly available across all my company locations, including road warriors.” CISO, Financial Services Company
    34. 34. SECURITY CONERNS WHAT IS PANDA CLOUD PROTECTION? ¿HOW DOES IT WORK? CLIENTS BENEFITS FEATURES INDEX
    35. 35. Panda Cloud Protection Portfolio PANDA CLOUD OFFICE PROTECTION PANDA CLOUD OFFICE PROTECTION completo conjunto de soluciones hosted para endpoint , e-mail y tráfico web PANDA CLOUD PROTECTION PANDA CLOUD EMAIL PROTECTION PANDA CLOUD INTERNET PROTECTION PANDA CLOUD OFFICE PROTECTION Complete SaaS security suite that protects all the threat entry points : endpoints, email and web traffic PANDA CLOUD PROTECTION 0
    36. 36. PANDA CLOUD OFFICE PROTECTION <ul><ul><li>Proactive protection for PCs, laptops and servers. Personal Firewall with centralized or personal management. Protection for files, email, HTTP/FTP and instant messaging </li></ul></ul><ul><ul><li>Web Console accessible from anywhere, 24/7 </li></ul></ul>Delegated Administration Management. Create groups and assign privileges Detailed, Summarized and Executive Reports . On-demand and scheduled scanning; results can be monitored in real time Peer-to-peer and automated Updates/Upgrades. Workstations and servers update or upgrade their protection from the nearest computer Protection based on security profiles and groups Flexible Installation. Can be done remotely from a single point or locally Panda Cloud Protection
    37. 37. Panda Cloud Portfolio PANDA CLOUD EMAIL PROTECTION <ul><ul><li>Perimetral Antivirus and Antispam. Connection filters, Filtering of Senders, Heuristic, Bayesian and content filters </li></ul></ul><ul><ul><li>Web Console accessible from anywhere, 24/7 </li></ul></ul><ul><ul><li>Delegated Administration Management. </li></ul></ul><ul><ul><li>Email traffic activity reports </li></ul></ul><ul><ul><li>Guaranteed filter mode ensures effective spam filtering, optimizing bandwidth and company resources </li></ul></ul><ul><ul><li>Business, domain or user level security profiles and setting </li></ul></ul><ul><ul><li>Webmail service for four days. Email backup for 15 days </li></ul></ul><ul><ul><li>Email Notifier for local management </li></ul></ul>
    38. 38. Panda Cloud Protection PANDA CLOUD INTENET PROTECTION <ul><ul><li>Antivirus Web, anti-malware, Protection against Botnets, Phishing attacks, Cross Site Scripting and other advanced Web 2.0 attacks. Web access control </li></ul></ul><ul><ul><li>Administration web console available 24/7 from any location </li></ul></ul><ul><ul><li>Content inspection filtering of all Web traffic. Ensures that confidential data (sales policies, clients data, social security) does not leave the organization </li></ul></ul><ul><ul><li>Centralized global reports for all Web traffic in real-time </li></ul></ul><ul><ul><li>Dynamic URL filtering and granular control of Web2.0 applications and activity (control who can do what (view, post), when (time), where (sites) </li></ul></ul><ul><ul><li>Data Leak Prevention (DLP) </li></ul></ul><ul><ul><li>Optimize and control bandwidth </li></ul></ul><ul><ul><li>Ultra-low latency: Minimum redirection , insignificant latency </li></ul></ul>
    39. 39. <ul><li>Technology partners </li></ul>Why Panda Security?
    40. 40. Panda Security THANK YOU!!!

    ×