The document describes Panda Cloud Protection, a SaaS security solution that protects endpoints, email, and web traffic from cyber threats. It works by connecting client systems and traffic in real time to Panda's Collective Intelligence for proactive protection with 15 security modules. Benefits include robust protection, no upfront investment or maintenance costs, automatic updates, and centralized remote management through a web console.
Nowadays, your users are the primary attack vector, since they are not only sitting in the office, but they also carry mobile devices that are always on and almost always connected to the Internet.
So, besides protecting your datacenter, you need to protect your users wherever they are and whenever they connect to the Internet and/or to your corporate network.
zScaler, as a SaaS (Security-as-a-Service) platform, enables you to provide such protection, as well streamline your network connectivity.
Corona| COVID IT Tactical Security Preparedness: Threat ManagementRedZone Technologies
Work from Home - Practical Advice on Operations and Security Impact and what to do about it.
DR and BCP Planning Ideas
Widening Attack Surface Solutions
Managing Threats Solutions
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDCCloudflare
Join this webinar with guest speaker Christopher Rodriguez, Research Manager of Cybersecurity Products for IDC and Cloudflare, recently named a Leader in the IDC MarketScape: Worldwide DDoS Prevention Solutions 2019 Vendor Assessment (Doc #US43699318, March 2019).
In this webinar, you will learn:
- Why defending against only volumetric layer 3 and 4 attacks will leave you vulnerable to other emerging DDoS attack vectors
- What economic and technological shifts are making DDoS more harmful and more evasive
- Why bot management should be considered in every DDoS mitigation strategy
- Which types of companies in North America are highly targeted and why
Nowadays, your users are the primary attack vector, since they are not only sitting in the office, but they also carry mobile devices that are always on and almost always connected to the Internet.
So, besides protecting your datacenter, you need to protect your users wherever they are and whenever they connect to the Internet and/or to your corporate network.
zScaler, as a SaaS (Security-as-a-Service) platform, enables you to provide such protection, as well streamline your network connectivity.
Corona| COVID IT Tactical Security Preparedness: Threat ManagementRedZone Technologies
Work from Home - Practical Advice on Operations and Security Impact and what to do about it.
DR and BCP Planning Ideas
Widening Attack Surface Solutions
Managing Threats Solutions
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDCCloudflare
Join this webinar with guest speaker Christopher Rodriguez, Research Manager of Cybersecurity Products for IDC and Cloudflare, recently named a Leader in the IDC MarketScape: Worldwide DDoS Prevention Solutions 2019 Vendor Assessment (Doc #US43699318, March 2019).
In this webinar, you will learn:
- Why defending against only volumetric layer 3 and 4 attacks will leave you vulnerable to other emerging DDoS attack vectors
- What economic and technological shifts are making DDoS more harmful and more evasive
- Why bot management should be considered in every DDoS mitigation strategy
- Which types of companies in North America are highly targeted and why
Protecting Mission-Critical Source Code from Application Security Vulnerabili...IBM Security
View on demand: http://event.on24.com/wcc/r/1071186/DB920F7B3EC241F8D7637CE3303D6585
Session 2 of IBM’s #CoverYourApps with Application Security on Cloud Webinar Series
In this session, you’ll learn how to test application source code for potential security vulnerabilities, so that you can confidently release your organization’s applications. Special emphasis will paid on how to test code quickly and effectively, in order to keep up with the ever-increasing pace of application release schedules.
Check out the rest of our #CoverYourApps with IBM’s Application Security on Cloud Webinar Series! Register today for all three to get up to speed on the latest from IBM on Application Security on Cloud.
Symantec Cyber Security Solutions minimize the potential business impact of increasingly sophisticated and targeted attacks by reducing the time it takes to detect, assess and respond to security incidents.
Protect Your Data and Apps in the Public CloudImperva
Organizations continue to move their data and apps to the cloud and cybercriminals see this move as a huge opportunity. Both Amazon Web Services and Microsoft Azure provide basic security measures to protect infrastructure resources. But, did you know it’s the customer’s responsibility to secure their assets hosted in both environments? View this presentation and learn what security measures you should take to protect your data and apps hosted in AWS and Azure.
Avoiding the Data Compliance "Hot Seat"IBM Security
View on demand: http://event.on24.com/wcc/r/1059973/D8BA686B6DACA4DB5A43CC08BD4BBDFC
Audits can occur at any time; do you know where your personal and corporate sensitive data resides? Do you have the right measures in place to protect it? You need to be prepared to answer questions about roles and responsibilities in your organization, such as:
- Do you have documentation about who needs to do what?
- Do you have well-defined roles, responsibilities and processes for data security operations, auditing and managing compliance and policy mandates?
- Do you have evidence that you are following these processes and procedures?
Join this webcast to learn how you can take control with automated data security to cost-effectively address regulations, avoid fines and stay out of the hot seat.
UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...UCloud Asia Pte Ltd
SME faced massive attack from hacker and phishing attack in the year 2007, many well-known establishments was attacked and paid a high price to recover both monetary and reputation.
Do not be the next target, armed yourself with the knowledge to prevent.
UCloud Asia Pte Ltd was founded Nov 2016 and will bring over Venture Domain Hosting with over 15 years in business as the hosting division providing Managed Hosting services, cloud hosting, VPS hosting, Microsoft Office365, domain name registration.
Vision: To build a company with sustainable growth, providing exceptional customer service and satisfaction via happy and motivated international team.
Mission: We strive to continually simplify scalable technology in order to solve business problems.
Eliminate cyber-security threats using data analytics – Build a resilient ent...Impetus Technologies
The current pandemic situation has fueled an unprecedented rise in digital transactions across the globe. This has led to a surge in cyber attacks and malicious online activities. To ensure business continuity and mitigate risks, enterprises need to detect and respond to security threats in real-time.
While the “new normal” presents several security challenges, it also offers enterprises a unique opportunity to enforce and bolster 360-degree security measures. Join our upcoming webinar to discover how advanced data analytics can help you detect and address:
Fraudulent transactions
Cyber attacks
Data thefts
Asset and data security
To learn more about the webinar - view https://bit.ly/3hQ4sgw
Protecting Your Business - All Covered Security ServicesAll Covered
All Covered is a nationwide provider of IT services and security. This presentation highlights the most essential factors that businesses need to be aware of when implementing their security plan. It shows how any company, regardless of size, is at risk with external, and internal, security threats.
Whether you own a small, medium, or large business, IT security should be at the forefront of any discussion. It is better to be proactive and prevent an attack from happening than having to pick up the pieces after the damage has already been done to your business.
DDos Attacks and Web Threats: How to Protect Your Site & Informationjenkoon
Hacking and data theft use to belong to expert hackers. Today, anybody can go online, download free hacking tools, and launch sophisticated Web attacks within minutes. Join InterDev as we host this webinar presented by Imperva to see these tools in action and learn how to protect your Website from these attacks.
Imperva's Web application cloud based security solution, specifically designed for small and mid-sized organizations, can secure your Website against attacks from free hacking tools such as Havij.
10 Security Essentials Every CxO Should KnowIBM Security
View On Demand Webinar: http://event.on24.com/wcc/r/1060940/3EBB3C7D778564710E957F99AF1D7C1B
How comprehensive is your security program? Organizations today are reliant on technology more than ever to achieve competitive advantage. Whether it is growing your brand, automating a supply chain or moving to cloud and mobile, technology is the lifeblood of business. This shift in reliance also brings cyber threats that must be addressed.
Based on extensive experience, IBM has established 10 Essential Practices for a comprehensive security posture. Join Glen Holland, Global Practice Lead of SAP Security Services, to hear about the key imperatives can help you understand and address these threats and protect the business.
In this on demand webinar, you will learn:
- The 10 security essentials and best practices of today’s security leaders
- How to assess your security maturity
- Where your critical gaps lie and how to prioritize your actions
Database surveillance can protect data, simplify compliance audits and improve visibility into data usage and user behavior. Walk through these slides to learn:
• The benefits of database monitoring over native audit tools
• Factors to consider before investing in database audit and protection
• Three specific ways to leverage database monitoring for improved security
Most of the money thrown at securing information systems misses the weak spots. Huge amounts are spent securing infrastructure while web applications are left exposed. It is a crisis that is largely ignored.
Software development teams, under pressure to deliver features and meet deadlines, often respond to concerns about the security of their web applications by commissioning a last-minute security assessment and then desperately attempt to address only the most glaring findings. They may even simply throw up a web application firewall to mitigate the threats. Such bolted-on solutions are not long-term answers to web application security.
Instead, we advocate a built-in approach. We will show that by weaving security into the software development life cycle, and using mature resources for security coding standards, toolkits and frameworks such as those from OWASP, development teams can consistently produce secure systems without dramatically increasing the development effort or cost.
This slide deck was most recently presented at a SPIN meeting in Cape Town In September 2012 by Paul and Theo from ThinkSmart (www.thinksmart.co.za).
For more information, contact Paul at ThinkSmart (dot see oh dot zed ay).
Will your organization or enterprise expand cost-effectively with the power of a managed cloud? We outline 10 key reasons why this strategy will help you improve security, simplify compliance, reduce costs and streamline scalability.
Database monitoring - First and Last Line of Defense Imperva
In the battle to defend your data you have an edge over the hacker that can prevent or minimize the damage of a database breach. You have the advantage of operating within your own environment and can deploy automated surveillance capabilities to watch sensitive data. When a hacker breaches the firewall or compromises a privileged user they are beyond the reach of most security measures. Only a data centric solution that directly monitors data access will be able to spot and stop the abnormal activity.
View this presentation to learn how SecureSphere data protection solutions can help you improve your security profile and protect your company against a database breach.
Protecting Mission-Critical Source Code from Application Security Vulnerabili...IBM Security
View on demand: http://event.on24.com/wcc/r/1071186/DB920F7B3EC241F8D7637CE3303D6585
Session 2 of IBM’s #CoverYourApps with Application Security on Cloud Webinar Series
In this session, you’ll learn how to test application source code for potential security vulnerabilities, so that you can confidently release your organization’s applications. Special emphasis will paid on how to test code quickly and effectively, in order to keep up with the ever-increasing pace of application release schedules.
Check out the rest of our #CoverYourApps with IBM’s Application Security on Cloud Webinar Series! Register today for all three to get up to speed on the latest from IBM on Application Security on Cloud.
Symantec Cyber Security Solutions minimize the potential business impact of increasingly sophisticated and targeted attacks by reducing the time it takes to detect, assess and respond to security incidents.
Protect Your Data and Apps in the Public CloudImperva
Organizations continue to move their data and apps to the cloud and cybercriminals see this move as a huge opportunity. Both Amazon Web Services and Microsoft Azure provide basic security measures to protect infrastructure resources. But, did you know it’s the customer’s responsibility to secure their assets hosted in both environments? View this presentation and learn what security measures you should take to protect your data and apps hosted in AWS and Azure.
Avoiding the Data Compliance "Hot Seat"IBM Security
View on demand: http://event.on24.com/wcc/r/1059973/D8BA686B6DACA4DB5A43CC08BD4BBDFC
Audits can occur at any time; do you know where your personal and corporate sensitive data resides? Do you have the right measures in place to protect it? You need to be prepared to answer questions about roles and responsibilities in your organization, such as:
- Do you have documentation about who needs to do what?
- Do you have well-defined roles, responsibilities and processes for data security operations, auditing and managing compliance and policy mandates?
- Do you have evidence that you are following these processes and procedures?
Join this webcast to learn how you can take control with automated data security to cost-effectively address regulations, avoid fines and stay out of the hot seat.
UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...UCloud Asia Pte Ltd
SME faced massive attack from hacker and phishing attack in the year 2007, many well-known establishments was attacked and paid a high price to recover both monetary and reputation.
Do not be the next target, armed yourself with the knowledge to prevent.
UCloud Asia Pte Ltd was founded Nov 2016 and will bring over Venture Domain Hosting with over 15 years in business as the hosting division providing Managed Hosting services, cloud hosting, VPS hosting, Microsoft Office365, domain name registration.
Vision: To build a company with sustainable growth, providing exceptional customer service and satisfaction via happy and motivated international team.
Mission: We strive to continually simplify scalable technology in order to solve business problems.
Eliminate cyber-security threats using data analytics – Build a resilient ent...Impetus Technologies
The current pandemic situation has fueled an unprecedented rise in digital transactions across the globe. This has led to a surge in cyber attacks and malicious online activities. To ensure business continuity and mitigate risks, enterprises need to detect and respond to security threats in real-time.
While the “new normal” presents several security challenges, it also offers enterprises a unique opportunity to enforce and bolster 360-degree security measures. Join our upcoming webinar to discover how advanced data analytics can help you detect and address:
Fraudulent transactions
Cyber attacks
Data thefts
Asset and data security
To learn more about the webinar - view https://bit.ly/3hQ4sgw
Protecting Your Business - All Covered Security ServicesAll Covered
All Covered is a nationwide provider of IT services and security. This presentation highlights the most essential factors that businesses need to be aware of when implementing their security plan. It shows how any company, regardless of size, is at risk with external, and internal, security threats.
Whether you own a small, medium, or large business, IT security should be at the forefront of any discussion. It is better to be proactive and prevent an attack from happening than having to pick up the pieces after the damage has already been done to your business.
DDos Attacks and Web Threats: How to Protect Your Site & Informationjenkoon
Hacking and data theft use to belong to expert hackers. Today, anybody can go online, download free hacking tools, and launch sophisticated Web attacks within minutes. Join InterDev as we host this webinar presented by Imperva to see these tools in action and learn how to protect your Website from these attacks.
Imperva's Web application cloud based security solution, specifically designed for small and mid-sized organizations, can secure your Website against attacks from free hacking tools such as Havij.
10 Security Essentials Every CxO Should KnowIBM Security
View On Demand Webinar: http://event.on24.com/wcc/r/1060940/3EBB3C7D778564710E957F99AF1D7C1B
How comprehensive is your security program? Organizations today are reliant on technology more than ever to achieve competitive advantage. Whether it is growing your brand, automating a supply chain or moving to cloud and mobile, technology is the lifeblood of business. This shift in reliance also brings cyber threats that must be addressed.
Based on extensive experience, IBM has established 10 Essential Practices for a comprehensive security posture. Join Glen Holland, Global Practice Lead of SAP Security Services, to hear about the key imperatives can help you understand and address these threats and protect the business.
In this on demand webinar, you will learn:
- The 10 security essentials and best practices of today’s security leaders
- How to assess your security maturity
- Where your critical gaps lie and how to prioritize your actions
Database surveillance can protect data, simplify compliance audits and improve visibility into data usage and user behavior. Walk through these slides to learn:
• The benefits of database monitoring over native audit tools
• Factors to consider before investing in database audit and protection
• Three specific ways to leverage database monitoring for improved security
Most of the money thrown at securing information systems misses the weak spots. Huge amounts are spent securing infrastructure while web applications are left exposed. It is a crisis that is largely ignored.
Software development teams, under pressure to deliver features and meet deadlines, often respond to concerns about the security of their web applications by commissioning a last-minute security assessment and then desperately attempt to address only the most glaring findings. They may even simply throw up a web application firewall to mitigate the threats. Such bolted-on solutions are not long-term answers to web application security.
Instead, we advocate a built-in approach. We will show that by weaving security into the software development life cycle, and using mature resources for security coding standards, toolkits and frameworks such as those from OWASP, development teams can consistently produce secure systems without dramatically increasing the development effort or cost.
This slide deck was most recently presented at a SPIN meeting in Cape Town In September 2012 by Paul and Theo from ThinkSmart (www.thinksmart.co.za).
For more information, contact Paul at ThinkSmart (dot see oh dot zed ay).
Will your organization or enterprise expand cost-effectively with the power of a managed cloud? We outline 10 key reasons why this strategy will help you improve security, simplify compliance, reduce costs and streamline scalability.
Database monitoring - First and Last Line of Defense Imperva
In the battle to defend your data you have an edge over the hacker that can prevent or minimize the damage of a database breach. You have the advantage of operating within your own environment and can deploy automated surveillance capabilities to watch sensitive data. When a hacker breaches the firewall or compromises a privileged user they are beyond the reach of most security measures. Only a data centric solution that directly monitors data access will be able to spot and stop the abnormal activity.
View this presentation to learn how SecureSphere data protection solutions can help you improve your security profile and protect your company against a database breach.
Panda Endpoint Protection Plus is the cloud-based solution that allows you to manage the security of all of the computers in your network and control user productivity at the lowest possible cost of ownership.
More info: http://www.pandasecurity.com/enterprise/solutions/cloud-office-protection-advanced/
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...GARL
A presentation by Giuseppe "Gippa" Paternò", GARL Director, at Brighton event "Open Source, the Cloud and your business" on 18th November 2014
Enterprise secure identity in the cloud with Single Sign On and Strong Authentication
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...Criminal IP
Businesses and organizations have numerous network devices, databases, servers, applications, and domains, and all of these IT assets are through IP addresses and Ports.
Attack Surface Management refers to the proactive detection and management of attack vectors such as open ports, server vulnerabilities, similar domains, phishing, and domains distributing malicious code.
Criminal IP ASM automatically monitors and generates a report on assets exposed to the attack surface.
All IT assets are thoroughly detected globally, with a streamlined introduction procedure requiring registration of only one primary domain.
Request a FREE Demo of Criminal IP ASM at:
https://www.criminalip.io/asm/attack-surface-management
MT17_Building Integrated and Secure Networks with limited IT SupportDell EMC World
Many businesses need a secure and flexible network but are not networking experts. With Dell Networking and SonicWALL, you can enjoy an easy-to-manage high performance network for wired and wireless connectivity, secured by the award-winning SonicWALL Nextgen Firewall.
This presentation describes the structural issues that effect a small businesses information systems. The products and services provided by TechNecessities to address these issues are covered at a high level.
Strengthening security posture for modern-age SaaS providersCloudflare
Businesses become more resilient in times of crises. This is especially true for SaaS businesses that are facing unprecedented challenges in this environment. While some are catering to a surge in traffic, others are figuring out innovative solutions to retain their customers. In addition, increasing malicious attacks are straining the resources of these SaaS businesses.
Now more than ever, it is important for SaaS providers to deliver an uninterrupted experience. One that is fast, secure, and reliable to their customers in a cost effective manner.
Join this webcast to learn more about how ActiveCampaign leverages Cloudflare to deliver meaningful services to their end users.
"Evolving Cybersecurity Strategies" - Identity is the new security boundaryDean Iacovelli
As cyber attacks have matured and become more complex over the last number of years, the objective of most attacks has not changed: compromise and collect user credentials. This session will explore the changing cybersecurity landscape and how managing identity – both in the enterprise as well as across 3rd party applications - is becoming job #1 in managing your organization’s risk.
Panda Endpoint Protection is the cloud based solution that allows you to manage the security of your network endpoints (Windows, Mac, Linux and Android), without interfering with the performance and with minimum cost.
More info: http://www.pandasecurity.com/enterprise/solutions/cloud-office-protection/
1. PANDA CLOUD PROTECTION SaaS Security for endpoints, email and Web traffic: The complete, secure, light and simple solution
2. SECURITY CONERNS WHAT IS PANDA CLOUD PROTECTION? ¿HOW DOES IT WORK? CLIENTS BENEFITS FEATURES INDEX
3. SECURITY CONERNS WHAT IS PANDA CLOUD PROTECTION? ¿HOW DOES IT WORK? CLIENTS BENEFITS FEATURES INDEX
4. CYBER CRIMES keep increasing: Hackers try to access into companies PCs to steal confidential, proprietary, sensitive data or money. Security Concerns Small and medium-sized businesses face the same security problems threats as large companies Newer threats such as bots, phishing and malicious active content attack users as they use the Internet or email , and subsequently infect corporate networks. Cybercriminal takes advantage of the company’s infrastructure to execute their crimes : send SPAM, attack other businesses, install unwanted programs, etc.
5. 2004 2006 2007 2008 2009 2010 * 60 million Source: Pandalabs MARKET SITUATION EXPONTENTIAL INCREASE Malware samples received at PandaLabs 40 million 15 Mil X2 X10 Security Concerns
6. MALWARE DESIGNED FOR ECOMONIC GAIN Malware detected in 2009 Adware Spyware T rojan Worm Others source: Pandalabs 31,05% 59,53% 1.96% 2.93% 4.53% Malware and Spam affect all companies equally, regardless of company size Security Concerns
7. WEB 2.0 CHALLANGES Security Threats are no longer static: Stealth, polymorphic threats. Data Leakage: Read only copies of data no longer the problem, up to 80% of data leakage is done over the web (email, blogs, IM, Webmail, News Channels) Web Access Control : User created content boom. Web sites (networks, blogs, communities) are extremely dynamic, statically classifying them is no longer valid. Who accesses what and when? Bandwidth : 75%-90% of bandwidth is used for Web Traffic. New bandwidth hogs and risks (Streaming, P2P). The Internet is the tool of choice for nearly all companies today. Security Concerns
8. New Organizational CHALLENGES: Distributed workforces exacerbate security issues by lessening central control Road warriors: “I am hardly ever in the office”. Road warriors need personal and confidential data Remote office require additional solutions which decentralizes control and adds to TCO and maintenance overheads Teleworking: “I work from home”. Growing trend in working from home which adds more non-secure PCs to the problem. PCs used for personal use as well as professional. Managers: “I need to be constantly connected”. Managers using Smartphone, PDA devices . They deal with business critical data in non-secure environments Security Concerns
9. Productivity Loss : “ Non-work-related Internet surfing results in an estimated 40% productivity loss each year for American businesses” 1 Expensive and impractical solutions: Fragmented and partial security solutions decentralize control whilst increasing TCO and management overheads Saturated Bandwidth by non work related activities and applications further exacerbates productivity issues. 1 : Gartner Security Concerns BOTTOM LINE
10. SECURITY AND BUSINESS CONTINUITY Email Servers Admin Security Concerns Complexity and cost in managing antimalware and antispam at endpoints, email and web traffic Servers Database Servers X X X X X X X X X X X X X X
11. Traditional antivirus require too much time and effort from SMBs TIME Additional hardware and software infrastructure needed. Tight IT budget Complicated management requires dedicated and skilled personnel not focused on core business COSTS COMPLEXITY Security Concerns
12. Company Pain points Who suffers the consequences? SMALL AND MEDIUM BUSINESS REMOTE OFFICE BRANCH OFFICE HOME OFFICE - No budget for security management -No one in charge of security management ENTERPRISE - Lack of security-skilled resources -Tight IT budget - Manage geographically distributed offices - Low bandwidth consumption - Global Protection : Web, Email, Endpoints - 24x7 monitoring to reduce and manage risks - Exhaustive security control and enforcement of regulations (HIPAA, PCI, etc)
13.
14.
15. SECURITY CONERNS WHAT IS PANDA CLOUD PROTECTION? ¿HOW DOES IT WORK? CLIENTS BENEFITS FEATURES INDEX
16. WHAT IS SaaS? Security as a Service (SaaS*) means delivering traditional security applications as an Internet-based service to customers. SaaS main characteristics : Subscription service Hosted service High availability 24x7 Web-based interface Always updated Short improvements cycle Low TCO Opportunity : SaaS *Security as a Service applied to Security is also known as SecaaS by Gartner
17. Panda Cloud Office Protection (SaaS) vs. Software/Appliance Opportunity : SaaS PANDA CLOUD PROTECTION Hosted by Panda , light on client side Web Console 24/7 . No investment in HW/SW No dedicated resource needed One solution for entire organization Redirect traffic once and forget about it No maintenance for HW / SW, databases, updates, upgrades, outages Any user, any device, anytime from anywhere SOFTWARE/APPLIANCE On premise Installed locally Higher TCO Dedicated It recourses Fragment, multi single point solutions More complex. More time consuming HW and SW maintenance , databases, updates, outages.. Unmanaged, more complex to protect Infrastructure Console Cost IT resources Centralized Installation Ease of use Mobile users
23. COLLECTIVE INTELLIGENCE Unmatched Security Data Processing Collective Intelligence Daily Intelligence at Panda Research 100 MILLION - Unique Samples Processed 75.000 - Samples Received Daily 55.000 – Unique Samples Daily 52% of Malware “live” 24 hours 99.4% of all malware detected is managed by Collective Intelligence automatically Dedicated Research & Development team at PandaLabs monitors thousands of malware sites gathering 18 Terabytes of information Truprevent Antivirus Antimalware It is a matter of survival for AV vendors , who increasingly are looking for ways to reinvent themselves as their product struggle to thwart new type of infections Cloud-based, collective intelligence services are the next big thing for anti-malware I expect that every AV vendor will need to embrace an approach like this if they expect to survive Yankee Group
24. SECURITY CONERNS WHAT IS PANDA CLOUD PROTECTION? ¿HOW DOES IT WORK? CLIENTS BENEFITS FEATURES INDEX
25. CLIENTS BENEFITS Robust protection for endpoints, email and web with 15 modules No initial investment , maintenance, nor specialized resources Minimizes resource consumption at endpoint, network and email servers Automatic updates / upgrades Easy to use. Installation and management centralized and remote Anywhere availability 24/7 Web access control, dynamic URL filtering. Web 2.0 and bandwidth usage control Regulations compliance, data leak prevention and Green IT alligment Clients Benefits
26.
27.
28. How does Panda Cloud Protection solve Tim’s Concern? Improve Security & Risk Management Reduce Fixed and Operational Costs Focus on Business Needs Maximum protection for endpoint, email and web traffic Centralized Security Management of the whole business HQ, remote offices and road warriors with the same security policies Periodical Malware Audits for prevention Web access control Business is protected against new web threats (Web 2.0, rogueware ) No Investment in hardware and software for security in the new Office Recycling servers for new Office Less bandwidth & resource consumption Reduce installation time . Simply Install and Manage No time in Server Maintenances , Updating/Upgrading Less Time in Security Management & cleaning infections Reduce Email Server Load Less email traffic on the network Efficient anti-spam filtering TIM “ THE IT GUY” Case Study
29. SECURITY CONERNS WHAT IS PANDA CLOUD PROTECTION? ¿HOW DOES IT WORK? CLIENTS BENEFITS FEATURES INDEX
30. How Does It Work? OFFICE 1 OFFICE 2 CLIENT 1 Instalation Option 1 . Users receive an email with a link, and click on it to install. Instalation Option 2 . Push instalation with our distribution tool. Instalation Option 3 . You can also generation an inbstalation package and distribute it through login-script, Active Directory, Tivoli, SMS, LanDesk, etc Transparent updates from nearest computers. Minimizes broadband consumption.
33. INTERNET CONFIDENTIAL Real-time dashboard Real-time transaction detail Location, department or application view Visibility into Web 2.0 Applications How Does It Work? Overall usage for Social Networks Top applications for: guest Social Networks used Webmails sent and viewed Webmail Threats like Botnets and Malicious code Transaction level details of threats for user : Admin Internet usage by Location Top Internet Users Usage trend by department “ Simply Unbelievable! The information I could not get at all before, or it took days to pull it out of multiple massive logs, is instantly available across all my company locations, including road warriors.” CISO, Financial Services Company
34. SECURITY CONERNS WHAT IS PANDA CLOUD PROTECTION? ¿HOW DOES IT WORK? CLIENTS BENEFITS FEATURES INDEX
35. Panda Cloud Protection Portfolio PANDA CLOUD OFFICE PROTECTION PANDA CLOUD OFFICE PROTECTION completo conjunto de soluciones hosted para endpoint , e-mail y tráfico web PANDA CLOUD PROTECTION PANDA CLOUD EMAIL PROTECTION PANDA CLOUD INTERNET PROTECTION PANDA CLOUD OFFICE PROTECTION Complete SaaS security suite that protects all the threat entry points : endpoints, email and web traffic PANDA CLOUD PROTECTION 0
Antivirus products require too much time and effort for small and medium sized companies. Once they buy the antivirus, they have to invest time and effort in: Additional hardware such as servers to host a centralized console with the attached services and databases. Additional supporting software licenses such as database software to run protection’s reports or configuration. Complicated security management requires dedicated and skilled personnel - not focused on the core business- to manage and control protection. Many SMBs do not want these hassles because all these tasks distract them from their core business.
SMBs understand full well that they face the same risks and regulations as large organizations. The increasing number of threats makes their protection needs more complex: There are more threats than ever (PandaLabs received more malware last year than in the previous 16 years combined) Malware is silent and more difficult to combat as long as it remains hidden , causing identity theft, financial and productivity losses and other malicious action. This malware landscape that organizations have to face requires a full set of maximized malware detection capabilities. When the SMBs implement a security solution, they have to choose one that provides adequate protection and that adapts to their specific needs . In many cases, their limited resources are not enough to obtain the security levels they require. Small and mid-sized businesses usually lack skilled resources for protecting and managing the security of their networks. They tend to invest all possible resources in their core business activities and this prevents them from assigning an adequate part of their budget to IT security. Most of them invest just enough to get by. They also need a continued monitoring system in order to reduce risk. Remote and branch offices are often geographically distributed and therefore need to be managed remotely from a centralized point. They also need to simplify security management as much as possible and have a continued monitoring service with reduced bandwidth consumption . Home Offices have nobody in charge of security management and they have no budget for security management.
IN CHARGE OF Network management Hardware and Software maintenance Database programming Mail server maintenance and security patching Problem solving hardware and software issues Software installation, updating and deployment Security policy, setup and maintenance (server, database, installation, upgrades) Web. The new Challenge of On-line Order System. Negotiation with vendors IT Responsible for the new Office PROBLEMS 20-30% of time putting out fires Past 2 months has spent 3 days to reinstall 6 computers Rootkit Administration computer found to be infected with keylogger Had to contact the bank and rescan the network Commercial Rep. are using retail antivirus Uncertain about state of updates for the mobile and remote users Once a week has to travel to remote offices for maintenance (hardware, software and security) Cannot keep up with security, admin. & development tasks Has to deploy
8 Security as a Service (SaaS) means delivering traditional security applications as an Internet-based service to customers. Subscription service: Since SaaS is a subscription-based service (service vs. product), vendors have greater focus on quality of service and support. This forces to stay on top of quality, maintenance and service. Hosted service: With SaaS, multiple customers use the Internet to make use of a single copy of an application that runs on an Internet-connected server. This requires designing the software to support such multi-tenancy while keeping each customer’s data separate and secure. Being a Hosted service it doesn’t require infrastructure at the customer site. Infrastructure investments and expenses in maintenance, dimensioning when company grows, etc are not needed. High availability 24x7 That means companies must provide high availability 24x7 uptime. To do this, the SaaS company must have servers in a worldclass data center that has redundant UPS power, generator backup, fully meshed Tier 1 connectivity to multiple backbone providers and in-depth 24x7 monitoring, among other features. They must respond immediately to any hardware, software or database administration issues. In addition, SaaS customers demand 24x7 customer support. Web-based interface The application ’s interface is web-based enabling the end-customer access the application through the internet anytime 24x7 from anywhere. Always updated Because SaaS software updates only require changes on a single platform at centrally located servers, rolling out updates is much simpler. Short improvements cycle SaaS companies can constantly see how their users are using their applications in real time. They immediately analyze what is working well and what isn’t. Successful companies use this information to respond quickly by implementing software updates with a shorter cycle than is possible with on premise software. Low TCO The automatic upgrades delivered by SaaS programs result in a lower total cost of ownership (TCO) due to the fact that SaaS eliminates much of the IT effort to solution upgrades. In fact, compared to traditional on-premise installations, SaaS applications have an overall 20%-40% lower TCO, allowing companies to reallocate resources in other areas. Rapid installs also translate into a quicker return on investment.
IN CHARGE OF Network management Hardware and Software maintenance Database programming Mail server maintenance and security patching Problem solving hardware and software issues Software installation, updating and deployment Security policy, setup and maintenance (server, database, installation, upgrades) web. The new Challenge of On-line Order System. Negotiation with vendors IT Responsible for the new Office PROBLEMS 20-30% of time putting out fires Past 2 months has spent 3 days to reinstall 6 computers Rootkit Administration computer found to be infected with keylogger Had to contact the bank and rescan the network Commercial Rep. are using retail antivirus Uncertain about state of updates for the mobile and remote users Once a week has to travel to remote offices for maintenance (hardware, software and security) Cannot keep up with security, admin. & development tasks Has to deploy
Is it 18 terabytes or 25?
Robust protection Proactive anti-malware protection based on Collective Intelligence for PCs, laptops and servers which detects and eliminates viruses, worms, trojans, spyware, adware, rootkits, bots, hacking tools, unwanted programs and phishing . Locally or centrally managed personal Firewall. Updates are automatic and transparent , ensuring immediate protection with the latest technologies against the latest threats. Minimal costs No initial investment or hardware and software maintenance . Costs are predictable . No IT specialized, dedicated resources are required. There are no upgrade costs as these are completely automatic . Minimal resource consumption Panda Security’s light, proactive technologies along with Collective Intelligence minimize resource consumption . Optimized update technologies ensure minimal bandwidth usage. Easy to use, easy to maintain Startup is immediate , after minimal Web-based configuration, allowing companies to enjoy maximum protection in a matter of minutes, no matter where users are located . Infrastructure maintenance and updates are directly managed by Panda Security . Installation, configuration, reports and security management is performed centrally , from anywhere through a Web console available 24x7 Control Profile-based security policies. Centrally monitor in real time of endpoint security status, scheduled scans results and malware and network attacks detections Detections alerts via email Detection, status and executive reports for the all endpoints or by groups Global security audit Regulatory compliance Centralized security management , reports , profile-based security policies and periodic audits aid compliance with regulations: SOX, PCI, HIPAA. Green IT Reduced energy bills, as no dedicated servers are required. Reduced mail server processing, as well as a reduction in usage of bandwidth and local computer resources. Reduced environmental impact through lower energy consumption (CO 2 emissions) Improved corporate image - environmental responsibility
Delay or no need to purchase new hardware Server Less processing needs means delay purchase or no purchase of new infrastructure or services PCs PCs no longer need to upgrade memory or CPU Change Fixed for Variable Costs No upfront costs Pay as you go Improved Liquidity SaaS can be expensed instead of depreciated
IN CHARGE OF Network management Hardware and Software maintenance Database programming Mail server maintenance and security patching Problem solving hardware and software issues Software installation, updating and deployment Security policy, setup and maintenance (server, database, installation, upgrades) Web. The new Challenge of On-line Order System. Negotiation with vendors IT Responsible for the new Office PROBLEMS 20-30% of time putting out fires Past 2 months has spent 3 days to reinstall 6 computers Rootkit Administration computer found to be infected with keylogger Had to contact the bank and rescan the network Commercial Rep. are using retail antivirus Uncertain about state of updates for the mobile and remote users Once a week has to travel to remote offices for maintenance (hardware, software and security) Cannot keep up with security, admin. & development tasks Has to deploy
La continuidad del negocio, factor crítico en la realidad económica actual, y el cumplimiento de regulaciones requieren sistemas de protección robustos, fiables y en continua evolución para bloquear todas las vías de entrada de malware. Sin embargo, las empresas sufren continuos recortes presupuestarios y falta de recursos especializados , que hace imposible la implantación y mantenimiento de las medidas necesarias de seguridad.
Malware por pendrive Rootkits. Análisis en profundidad Inspección del tráfico por el firewall y detección de intrusos