SlideShare a Scribd company logo
PANDA CLOUD PROTECTION SaaS Security for endpoints, email and Web traffic:  The complete, secure, light and simple solution
SECURITY CONERNS WHAT IS PANDA CLOUD PROTECTION?  ¿HOW DOES  IT WORK? CLIENTS BENEFITS FEATURES INDEX
SECURITY CONERNS WHAT IS PANDA CLOUD PROTECTION?  ¿HOW DOES  IT WORK? CLIENTS BENEFITS FEATURES INDEX
CYBER CRIMES  keep increasing: Hackers try to access into companies PCs to  steal confidential, proprietary, sensitive data or money. Security   Concerns Small and medium-sized businesses  face the same security problems threats as large companies Newer threats such as bots, phishing and malicious active content attack users as they use the  Internet  or  email , and subsequently  infect  corporate  networks. Cybercriminal takes advantage of the company’s infrastructure to  execute their crimes : send SPAM, attack other businesses, install unwanted programs, etc.
2004 2006 2007 2008 2009 2010 * 60  million Source: Pandalabs MARKET SITUATION EXPONTENTIAL INCREASE  Malware samples received at PandaLabs 40  million 15 Mil X2 X10 Security   Concerns
MALWARE DESIGNED FOR ECOMONIC GAIN Malware detected in  2009 Adware Spyware T rojan Worm Others source: Pandalabs 31,05% 59,53% 1.96% 2.93% 4.53% Malware and  Spam affect all companies equally,  regardless of company size Security   Concerns
WEB 2.0  CHALLANGES Security Threats  are no longer static:  Stealth, polymorphic threats. Data Leakage:  Read only copies of data no longer the problem, up to 80% of data leakage is done over the web (email, blogs, IM, Webmail, News Channels) Web Access Control : User created content boom. Web sites (networks, blogs, communities) are extremely dynamic, statically classifying them is no longer valid.  Who accesses what and when? Bandwidth :  75%-90%  of bandwidth is used for Web Traffic. New bandwidth hogs and risks (Streaming, P2P). The Internet is the  tool  of choice for nearly all companies today. Security   Concerns
New Organizational  CHALLENGES: Distributed   workforces   exacerbate security issues by lessening central control Road warriors: “I am hardly ever in the office”.  Road warriors need personal and confidential data  Remote office require  additional solutions  which decentralizes control and adds to TCO and maintenance overheads Teleworking: “I work from home”.  Growing  trend in working from home which adds more non-secure PCs to the problem. PCs used for personal use as well as professional. Managers: “I need to be constantly connected”.  Managers using Smartphone, PDA devices . They deal with business critical data in non-secure environments Security   Concerns
Productivity   Loss : “ Non-work-related Internet  surfing results in an estimated 40% productivity loss each year for American businesses” 1  Expensive and impractical solutions:  Fragmented and partial security solutions decentralize control  whilst increasing TCO and management overheads Saturated   Bandwidth  by non work related activities and applications further exacerbates productivity issues. 1 : Gartner Security   Concerns BOTTOM LINE
SECURITY AND BUSINESS CONTINUITY Email Servers Admin Security   Concerns Complexity and cost in managing antimalware and antispam at endpoints, email and web traffic Servers Database Servers X X X X X X X X X X X X X X
Traditional antivirus require  too much time  and effort  from SMBs TIME Additional hardware  and software infrastructure needed. Tight IT budget Complicated management  requires dedicated and skilled personnel not focused on core business COSTS COMPLEXITY Security   Concerns
Company Pain points Who suffers the consequences? SMALL AND MEDIUM BUSINESS REMOTE OFFICE  BRANCH OFFICE  HOME OFFICE - No budget for security management -No one in charge of security management ENTERPRISE - Lack of security-skilled resources -Tight IT budget - Manage geographically distributed offices - Low bandwidth consumption  - Global Protection :  Web, Email, Endpoints  - 24x7 monitoring to reduce and manage risks - Exhaustive security control and enforcement of regulations (HIPAA, PCI, etc)
Custom Mountain Bike PLC ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Case Study STEVE BROWN CEO
[object Object],[object Object],[object Object],[object Object],[object Object],Tim’s main  concerns : Improve Security: Factory, Remote Off. & Laptops. Complex management due to several gateways and roadwarriors Worry about the new threats in internet (rogueware, Web 2.0, etc)  Reduce mail server load Reduce Fixed & Operational Cost Reduce Time in Security maintenance & travelling, and Focus on the business needs TIM  “ THE IT GUY” Case Study
SECURITY CONERNS WHAT IS PANDA CLOUD PROTECTION?  ¿HOW DOES  IT WORK? CLIENTS BENEFITS FEATURES INDEX
WHAT IS SaaS? Security as a Service  (SaaS*) means delivering traditional security applications as an Internet-based service to customers.  SaaS main  characteristics : Subscription service Hosted service High availability 24x7 Web-based interface Always updated Short improvements cycle Low TCO Opportunity : SaaS *Security as a Service applied to Security is also known as SecaaS by Gartner
Panda Cloud Office Protection (SaaS)  vs.  Software/Appliance Opportunity : SaaS PANDA CLOUD PROTECTION Hosted by Panda ,  light on client side Web Console 24/7 . No investment  in HW/SW No dedicated resource needed One solution for  entire  organization Redirect traffic once and forget about it No maintenance for HW / SW, databases, updates, upgrades, outages Any user, any device, anytime from anywhere SOFTWARE/APPLIANCE On premise Installed locally Higher  TCO Dedicated It recourses Fragment, multi single point solutions More complex. More time consuming HW and SW maintenance , databases, updates, outages.. Unmanaged, more complex to protect Infrastructure Console Cost IT resources Centralized Installation Ease  of use Mobile  users
SaaS in today's businesses Opportunity : SaaS
SaaS  Security Markets Opportunity : SaaS
WHAT? Complete  SaaS   security   suite that  protects all the threat entry points :  endpoints, email and web traffic Headquaters  Road warriors Remote Office PANDA CLOUD PROTECTION Panda Cloud Protection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Panda Cloud Protection Portfolio PANDA CLOUD OFFICE PROTECTION PANDA CLOUD OFFICE PROTECTION Complete  SaaS   security   suite that  protects all the threat entry points :  endpoints, email and web traffic PANDA CLOUD PROTECTION PANDA CLOUD EMAIL  PROTECTION PANDA CLOUD INTERNET PROTECTION PANDA CLOUD OFFICE PROTECTION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],0
Panda Cloud Protection Panda Cloud Office Protection  ,[object Object],[object Object],[object Object],[object Object],[object Object]
COLLECTIVE INTELLIGENCE Unmatched  Security Data Processing Collective Intelligence Daily Intelligence at Panda Research 100 MILLION  - Unique Samples Processed 75.000  - Samples Received Daily 55.000  – Unique Samples Daily 52%  of Malware “live” 24 hours 99.4% of all malware detected  is managed by Collective Intelligence automatically Dedicated Research & Development team at PandaLabs monitors  thousands  of malware sites gathering  18 Terabytes  of information Truprevent Antivirus Antimalware It is a matter of survival for AV vendors , who increasingly are looking for ways to reinvent themselves as their product struggle to thwart new type of infections Cloud-based, collective intelligence services are  the next big thing for anti-malware I expect that every AV vendor will need to embrace an approach like this if they  expect to survive Yankee Group
SECURITY CONERNS WHAT IS PANDA CLOUD PROTECTION?  ¿HOW DOES  IT WORK? CLIENTS BENEFITS FEATURES INDEX
CLIENTS BENEFITS Robust protection  for endpoints, email and web with  15 modules No  initial investment , maintenance, nor specialized resources Minimizes  resource  consumption  at  endpoint, network and email servers Automatic  updates / upgrades Easy to use.  Installation and management centralized and remote Anywhere availability 24/7 Web access  control,  dynamic URL  filtering.  Web 2.0  and  bandwidth  usage control Regulations compliance, data leak prevention  and  Green IT alligment Clients Benefits
Clients Benefits ,[object Object],[object Object],[object Object],Robust protection ,[object Object],[object Object],[object Object],[object Object],Minimal costs ,[object Object],[object Object],[object Object],Minimal resource consumption ,[object Object],[object Object],[object Object],Easy to use, easy to maintain ,[object Object],[object Object],[object Object],[object Object],Comprehensive Security Control ,[object Object],[object Object],[object Object],Regulatory compliance & Green IT
How does Panda Cloud Protection solve CEO’s Concern? Liquidity Reduce Fixed cost Increase Productivity IT is focus on Core Business  Processes Total cost  in security has decreased in  50% No need  for Security infrastructure  Investment ,[object Object],IT has reduced time in Security  related tasks from 3 hours per day to one New Office  and On-line Order System were ready  as planned Ensure business continuity 24x7  active security service which does  not interfere in the day-to-day business  STEVE BROWN  CEO Case Study
How does Panda Cloud Protection solve Tim’s Concern? Improve Security & Risk Management Reduce Fixed and Operational Costs Focus on Business Needs Maximum protection  for endpoint, email and web traffic Centralized Security Management  of the whole business HQ, remote offices and road warriors  with the same security policies Periodical  Malware Audits for prevention Web access control Business is protected against  new web threats   (Web 2.0,  rogueware ) No Investment  in hardware and software for security in the new Office Recycling servers  for new Office Less bandwidth & resource consumption Reduce installation time . Simply Install and Manage  No time in Server Maintenances , Updating/Upgrading Less Time in Security Management  & cleaning infections  Reduce Email Server Load Less email traffic  on the network Efficient anti-spam  filtering TIM  “ THE IT GUY” Case Study
SECURITY CONERNS WHAT IS PANDA CLOUD PROTECTION?  ¿HOW DOES  IT WORK? CLIENTS BENEFITS FEATURES INDEX
How Does It Work? OFFICE 1 OFFICE 2 CLIENT 1  Instalation Option 1 . Users receive an email with a link, and click on it to install. Instalation Option 2 . Push instalation with our distribution tool.  Instalation Option 3 . You can also generation an inbstalation package and distribute it through login-script, Active Directory, Tivoli, SMS, LanDesk, etc Transparent updates from nearest computers. Minimizes broadband consumption.
How Does It Work?
INTERNET How Does It Work? X X
INTERNET CONFIDENTIAL Real-time dashboard Real-time transaction detail Location, department or application view Visibility into Web 2.0 Applications How Does It Work? Overall usage for Social Networks Top applications for: guest Social Networks used Webmails sent and viewed Webmail Threats like Botnets and Malicious code  Transaction level details of threats for user : Admin Internet usage by Location Top Internet Users Usage trend by department “ Simply Unbelievable!  The information I could not get at all before, or it took days to pull it out of multiple massive logs, is instantly available across all my company locations, including road warriors.” CISO, Financial Services Company
SECURITY CONERNS WHAT IS PANDA CLOUD PROTECTION?  ¿HOW DOES  IT WORK? CLIENTS BENEFITS FEATURES INDEX
Panda Cloud Protection Portfolio PANDA CLOUD OFFICE PROTECTION PANDA CLOUD OFFICE PROTECTION completo conjunto de  soluciones hosted  para  endpoint ,  e-mail y tráfico web PANDA CLOUD PROTECTION PANDA CLOUD EMAIL  PROTECTION PANDA CLOUD INTERNET PROTECTION PANDA CLOUD OFFICE PROTECTION Complete  SaaS   security   suite that  protects all the threat entry points :  endpoints, email and web traffic PANDA CLOUD PROTECTION 0
PANDA CLOUD OFFICE PROTECTION ,[object Object],[object Object],Delegated Administration Management. Create groups and assign privileges Detailed, Summarized and  Executive Reports . On-demand and scheduled scanning; results can be monitored in real time Peer-to-peer and automated Updates/Upgrades. Workstations and servers update or upgrade their protection from the nearest computer Protection based on security profiles and groups Flexible Installation.  Can be done remotely from a single point or locally Panda Cloud Protection
Panda Cloud Portfolio PANDA CLOUD EMAIL PROTECTION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Panda Cloud Protection PANDA CLOUD INTENET PROTECTION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],Why Panda Security?
Panda Security THANK YOU!!!

More Related Content

What's hot

Managed Security Services from Symantec
Managed Security Services from SymantecManaged Security Services from Symantec
Managed Security Services from Symantec
Arrow ECS UK
 
Protecting Mission-Critical Source Code from Application Security Vulnerabili...
Protecting Mission-Critical Source Code from Application Security Vulnerabili...Protecting Mission-Critical Source Code from Application Security Vulnerabili...
Protecting Mission-Critical Source Code from Application Security Vulnerabili...
IBM Security
 
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
Symantec Cyber Security Solutions | MSS and Advanced Threat ProtectionSymantec Cyber Security Solutions | MSS and Advanced Threat Protection
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
infoLock Technologies
 
Protect Your Data and Apps in the Public Cloud
Protect Your Data and Apps in the Public CloudProtect Your Data and Apps in the Public Cloud
Protect Your Data and Apps in the Public Cloud
Imperva
 
PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security SimulationPRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security SimulationSymantec
 
Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"
IBM Security
 
UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...
UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...
UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...
UCloud Asia Pte Ltd
 
UCloud Asia Company Presentation
UCloud Asia Company PresentationUCloud Asia Company Presentation
UCloud Asia Company Presentation
UCloud Asia Pte Ltd
 
Eliminate cyber-security threats using data analytics – Build a resilient ent...
Eliminate cyber-security threats using data analytics – Build a resilient ent...Eliminate cyber-security threats using data analytics – Build a resilient ent...
Eliminate cyber-security threats using data analytics – Build a resilient ent...
Impetus Technologies
 
Protecting Your Business - All Covered Security Services
Protecting Your Business - All Covered Security ServicesProtecting Your Business - All Covered Security Services
Protecting Your Business - All Covered Security Services
All Covered
 
IDC Cloud Security and Managed Services Conference Riyadh KSA
IDC Cloud Security and Managed Services Conference Riyadh KSAIDC Cloud Security and Managed Services Conference Riyadh KSA
IDC Cloud Security and Managed Services Conference Riyadh KSA
Jorge Sebastiao
 
Symantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucíSymantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucí
MarketingArrowECS_CZ
 
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & InformationDDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
jenkoon
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know
IBM Security
 
Hackers, Cyber Crime and Espionage
Hackers, Cyber Crime and EspionageHackers, Cyber Crime and Espionage
Hackers, Cyber Crime and Espionage
Imperva
 
Application Security Done Right
Application Security Done RightApplication Security Done Right
Application Security Done Right
pvanwoud
 
The Cloud Crossover
The Cloud CrossoverThe Cloud Crossover
The Cloud Crossover
Armor
 
Database monitoring - First and Last Line of Defense
Database monitoring - First and Last Line of Defense Database monitoring - First and Last Line of Defense
Database monitoring - First and Last Line of Defense
Imperva
 
IBM QRadar UBA
IBM QRadar UBA IBM QRadar UBA
IBM QRadar UBA
IBM Security
 

What's hot (20)

Managed Security Services from Symantec
Managed Security Services from SymantecManaged Security Services from Symantec
Managed Security Services from Symantec
 
Protecting Mission-Critical Source Code from Application Security Vulnerabili...
Protecting Mission-Critical Source Code from Application Security Vulnerabili...Protecting Mission-Critical Source Code from Application Security Vulnerabili...
Protecting Mission-Critical Source Code from Application Security Vulnerabili...
 
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
Symantec Cyber Security Solutions | MSS and Advanced Threat ProtectionSymantec Cyber Security Solutions | MSS and Advanced Threat Protection
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
 
Protect Your Data and Apps in the Public Cloud
Protect Your Data and Apps in the Public CloudProtect Your Data and Apps in the Public Cloud
Protect Your Data and Apps in the Public Cloud
 
PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security SimulationPRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
 
Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"
 
UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...
UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...
UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...
 
UCloud Asia Company Presentation
UCloud Asia Company PresentationUCloud Asia Company Presentation
UCloud Asia Company Presentation
 
Eliminate cyber-security threats using data analytics – Build a resilient ent...
Eliminate cyber-security threats using data analytics – Build a resilient ent...Eliminate cyber-security threats using data analytics – Build a resilient ent...
Eliminate cyber-security threats using data analytics – Build a resilient ent...
 
Protecting Your Business - All Covered Security Services
Protecting Your Business - All Covered Security ServicesProtecting Your Business - All Covered Security Services
Protecting Your Business - All Covered Security Services
 
IDC Cloud Security and Managed Services Conference Riyadh KSA
IDC Cloud Security and Managed Services Conference Riyadh KSAIDC Cloud Security and Managed Services Conference Riyadh KSA
IDC Cloud Security and Managed Services Conference Riyadh KSA
 
Symantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucíSymantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucí
 
DDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & InformationDDos Attacks and Web Threats: How to Protect Your Site & Information
DDos Attacks and Web Threats: How to Protect Your Site & Information
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know
 
Hackers, Cyber Crime and Espionage
Hackers, Cyber Crime and EspionageHackers, Cyber Crime and Espionage
Hackers, Cyber Crime and Espionage
 
Application Security Done Right
Application Security Done RightApplication Security Done Right
Application Security Done Right
 
Solution Brief
Solution BriefSolution Brief
Solution Brief
 
The Cloud Crossover
The Cloud CrossoverThe Cloud Crossover
The Cloud Crossover
 
Database monitoring - First and Last Line of Defense
Database monitoring - First and Last Line of Defense Database monitoring - First and Last Line of Defense
Database monitoring - First and Last Line of Defense
 
IBM QRadar UBA
IBM QRadar UBA IBM QRadar UBA
IBM QRadar UBA
 

Similar to Panda Cloud Services

MOP Technical Presentation.Ppt
MOP Technical Presentation.PptMOP Technical Presentation.Ppt
MOP Technical Presentation.Ppttswong
 
Panda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri redusePanda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri reduse
IDG Romania
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overview
Cisco Canada
 
Panda Security - Endpoint Protection Plus
Panda Security - Endpoint Protection PlusPanda Security - Endpoint Protection Plus
Panda Security - Endpoint Protection Plus
Panda Security
 
Cloudflare_Everywhere_Security_Solution_Brief (1).pdf
Cloudflare_Everywhere_Security_Solution_Brief (1).pdfCloudflare_Everywhere_Security_Solution_Brief (1).pdf
Cloudflare_Everywhere_Security_Solution_Brief (1).pdf
petchphumsanit40
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
GARL
 
How to protect business from malware
How to protect business from malware How to protect business from malware
How to protect business from malware Sanyog Chandra
 
Panda security corporate_presentation_2012
Panda security corporate_presentation_2012Panda security corporate_presentation_2012
Panda security corporate_presentation_2012
Truong Minh Yen
 
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...
Criminal IP ASM | Threat Intelligence-based  Automated Attack Surface Managem...Criminal IP ASM | Threat Intelligence-based  Automated Attack Surface Managem...
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...
Criminal IP
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT Support
Dell EMC World
 
Info Sec2007 End Point Final
Info Sec2007   End Point FinalInfo Sec2007   End Point Final
Info Sec2007 End Point Final
Ben Rothke
 
Services and Products
Services and ProductsServices and Products
Services and Products
Technecessities
 
Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)
GuardEra Access Solutions, Inc.
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009
Zernike College
 
Strengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providersStrengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providers
Cloudflare
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
Dean Iacovelli
 
Business Continuity 2009
Business Continuity 2009Business Continuity 2009
Business Continuity 2009
OS-Cubed, Inc.
 
Panda Security - Endpoint Protection
Panda Security - Endpoint ProtectionPanda Security - Endpoint Protection
Panda Security - Endpoint Protection
Panda Security
 

Similar to Panda Cloud Services (20)

MOP Technical Presentation.Ppt
MOP Technical Presentation.PptMOP Technical Presentation.Ppt
MOP Technical Presentation.Ppt
 
Panda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri redusePanda Cloud Protection - protectie maxima, costuri reduse
Panda Cloud Protection - protectie maxima, costuri reduse
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overview
 
Panda Security - Endpoint Protection Plus
Panda Security - Endpoint Protection PlusPanda Security - Endpoint Protection Plus
Panda Security - Endpoint Protection Plus
 
Cloudflare_Everywhere_Security_Solution_Brief (1).pdf
Cloudflare_Everywhere_Security_Solution_Brief (1).pdfCloudflare_Everywhere_Security_Solution_Brief (1).pdf
Cloudflare_Everywhere_Security_Solution_Brief (1).pdf
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
 
SecurePass at OpenBrighton
SecurePass at OpenBrightonSecurePass at OpenBrighton
SecurePass at OpenBrighton
 
How to protect business from malware
How to protect business from malware How to protect business from malware
How to protect business from malware
 
Panda security corporate_presentation_2012
Panda security corporate_presentation_2012Panda security corporate_presentation_2012
Panda security corporate_presentation_2012
 
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...
Criminal IP ASM | Threat Intelligence-based  Automated Attack Surface Managem...Criminal IP ASM | Threat Intelligence-based  Automated Attack Surface Managem...
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT Support
 
Info Sec2007 End Point Final
Info Sec2007   End Point FinalInfo Sec2007   End Point Final
Info Sec2007 End Point Final
 
Services and Products
Services and ProductsServices and Products
Services and Products
 
Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009
 
IP-guard Catalog
IP-guard CatalogIP-guard Catalog
IP-guard Catalog
 
Strengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providersStrengthening security posture for modern-age SaaS providers
Strengthening security posture for modern-age SaaS providers
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
 
Business Continuity 2009
Business Continuity 2009Business Continuity 2009
Business Continuity 2009
 
Panda Security - Endpoint Protection
Panda Security - Endpoint ProtectionPanda Security - Endpoint Protection
Panda Security - Endpoint Protection
 

Panda Cloud Services

  • 1. PANDA CLOUD PROTECTION SaaS Security for endpoints, email and Web traffic: The complete, secure, light and simple solution
  • 2. SECURITY CONERNS WHAT IS PANDA CLOUD PROTECTION? ¿HOW DOES IT WORK? CLIENTS BENEFITS FEATURES INDEX
  • 3. SECURITY CONERNS WHAT IS PANDA CLOUD PROTECTION? ¿HOW DOES IT WORK? CLIENTS BENEFITS FEATURES INDEX
  • 4. CYBER CRIMES keep increasing: Hackers try to access into companies PCs to steal confidential, proprietary, sensitive data or money. Security Concerns Small and medium-sized businesses face the same security problems threats as large companies Newer threats such as bots, phishing and malicious active content attack users as they use the Internet or email , and subsequently infect corporate networks. Cybercriminal takes advantage of the company’s infrastructure to execute their crimes : send SPAM, attack other businesses, install unwanted programs, etc.
  • 5. 2004 2006 2007 2008 2009 2010 * 60 million Source: Pandalabs MARKET SITUATION EXPONTENTIAL INCREASE Malware samples received at PandaLabs 40 million 15 Mil X2 X10 Security Concerns
  • 6. MALWARE DESIGNED FOR ECOMONIC GAIN Malware detected in 2009 Adware Spyware T rojan Worm Others source: Pandalabs 31,05% 59,53% 1.96% 2.93% 4.53% Malware and Spam affect all companies equally, regardless of company size Security Concerns
  • 7. WEB 2.0 CHALLANGES Security Threats are no longer static: Stealth, polymorphic threats. Data Leakage: Read only copies of data no longer the problem, up to 80% of data leakage is done over the web (email, blogs, IM, Webmail, News Channels) Web Access Control : User created content boom. Web sites (networks, blogs, communities) are extremely dynamic, statically classifying them is no longer valid. Who accesses what and when? Bandwidth : 75%-90% of bandwidth is used for Web Traffic. New bandwidth hogs and risks (Streaming, P2P). The Internet is the tool of choice for nearly all companies today. Security Concerns
  • 8. New Organizational CHALLENGES: Distributed workforces exacerbate security issues by lessening central control Road warriors: “I am hardly ever in the office”. Road warriors need personal and confidential data Remote office require additional solutions which decentralizes control and adds to TCO and maintenance overheads Teleworking: “I work from home”. Growing trend in working from home which adds more non-secure PCs to the problem. PCs used for personal use as well as professional. Managers: “I need to be constantly connected”. Managers using Smartphone, PDA devices . They deal with business critical data in non-secure environments Security Concerns
  • 9. Productivity Loss : “ Non-work-related Internet surfing results in an estimated 40% productivity loss each year for American businesses” 1 Expensive and impractical solutions: Fragmented and partial security solutions decentralize control whilst increasing TCO and management overheads Saturated Bandwidth by non work related activities and applications further exacerbates productivity issues. 1 : Gartner Security Concerns BOTTOM LINE
  • 10. SECURITY AND BUSINESS CONTINUITY Email Servers Admin Security Concerns Complexity and cost in managing antimalware and antispam at endpoints, email and web traffic Servers Database Servers X X X X X X X X X X X X X X
  • 11. Traditional antivirus require too much time and effort from SMBs TIME Additional hardware and software infrastructure needed. Tight IT budget Complicated management requires dedicated and skilled personnel not focused on core business COSTS COMPLEXITY Security Concerns
  • 12. Company Pain points Who suffers the consequences? SMALL AND MEDIUM BUSINESS REMOTE OFFICE BRANCH OFFICE HOME OFFICE - No budget for security management -No one in charge of security management ENTERPRISE - Lack of security-skilled resources -Tight IT budget - Manage geographically distributed offices - Low bandwidth consumption - Global Protection : Web, Email, Endpoints - 24x7 monitoring to reduce and manage risks - Exhaustive security control and enforcement of regulations (HIPAA, PCI, etc)
  • 13.
  • 14.
  • 15. SECURITY CONERNS WHAT IS PANDA CLOUD PROTECTION? ¿HOW DOES IT WORK? CLIENTS BENEFITS FEATURES INDEX
  • 16. WHAT IS SaaS? Security as a Service (SaaS*) means delivering traditional security applications as an Internet-based service to customers. SaaS main characteristics : Subscription service Hosted service High availability 24x7 Web-based interface Always updated Short improvements cycle Low TCO Opportunity : SaaS *Security as a Service applied to Security is also known as SecaaS by Gartner
  • 17. Panda Cloud Office Protection (SaaS) vs. Software/Appliance Opportunity : SaaS PANDA CLOUD PROTECTION Hosted by Panda , light on client side Web Console 24/7 . No investment in HW/SW No dedicated resource needed One solution for entire organization Redirect traffic once and forget about it No maintenance for HW / SW, databases, updates, upgrades, outages Any user, any device, anytime from anywhere SOFTWARE/APPLIANCE On premise Installed locally Higher TCO Dedicated It recourses Fragment, multi single point solutions More complex. More time consuming HW and SW maintenance , databases, updates, outages.. Unmanaged, more complex to protect Infrastructure Console Cost IT resources Centralized Installation Ease of use Mobile users
  • 18. SaaS in today's businesses Opportunity : SaaS
  • 19. SaaS Security Markets Opportunity : SaaS
  • 20.
  • 21.
  • 22.
  • 23. COLLECTIVE INTELLIGENCE Unmatched Security Data Processing Collective Intelligence Daily Intelligence at Panda Research 100 MILLION - Unique Samples Processed 75.000 - Samples Received Daily 55.000 – Unique Samples Daily 52% of Malware “live” 24 hours 99.4% of all malware detected is managed by Collective Intelligence automatically Dedicated Research & Development team at PandaLabs monitors thousands of malware sites gathering 18 Terabytes of information Truprevent Antivirus Antimalware It is a matter of survival for AV vendors , who increasingly are looking for ways to reinvent themselves as their product struggle to thwart new type of infections Cloud-based, collective intelligence services are the next big thing for anti-malware I expect that every AV vendor will need to embrace an approach like this if they expect to survive Yankee Group
  • 24. SECURITY CONERNS WHAT IS PANDA CLOUD PROTECTION? ¿HOW DOES IT WORK? CLIENTS BENEFITS FEATURES INDEX
  • 25. CLIENTS BENEFITS Robust protection for endpoints, email and web with 15 modules No initial investment , maintenance, nor specialized resources Minimizes resource consumption at endpoint, network and email servers Automatic updates / upgrades Easy to use. Installation and management centralized and remote Anywhere availability 24/7 Web access control, dynamic URL filtering. Web 2.0 and bandwidth usage control Regulations compliance, data leak prevention and Green IT alligment Clients Benefits
  • 26.
  • 27.
  • 28. How does Panda Cloud Protection solve Tim’s Concern? Improve Security & Risk Management Reduce Fixed and Operational Costs Focus on Business Needs Maximum protection for endpoint, email and web traffic Centralized Security Management of the whole business HQ, remote offices and road warriors with the same security policies Periodical Malware Audits for prevention Web access control Business is protected against new web threats (Web 2.0, rogueware ) No Investment in hardware and software for security in the new Office Recycling servers for new Office Less bandwidth & resource consumption Reduce installation time . Simply Install and Manage No time in Server Maintenances , Updating/Upgrading Less Time in Security Management & cleaning infections Reduce Email Server Load Less email traffic on the network Efficient anti-spam filtering TIM “ THE IT GUY” Case Study
  • 29. SECURITY CONERNS WHAT IS PANDA CLOUD PROTECTION? ¿HOW DOES IT WORK? CLIENTS BENEFITS FEATURES INDEX
  • 30. How Does It Work? OFFICE 1 OFFICE 2 CLIENT 1 Instalation Option 1 . Users receive an email with a link, and click on it to install. Instalation Option 2 . Push instalation with our distribution tool. Instalation Option 3 . You can also generation an inbstalation package and distribute it through login-script, Active Directory, Tivoli, SMS, LanDesk, etc Transparent updates from nearest computers. Minimizes broadband consumption.
  • 31. How Does It Work?
  • 32. INTERNET How Does It Work? X X
  • 33. INTERNET CONFIDENTIAL Real-time dashboard Real-time transaction detail Location, department or application view Visibility into Web 2.0 Applications How Does It Work? Overall usage for Social Networks Top applications for: guest Social Networks used Webmails sent and viewed Webmail Threats like Botnets and Malicious code Transaction level details of threats for user : Admin Internet usage by Location Top Internet Users Usage trend by department “ Simply Unbelievable! The information I could not get at all before, or it took days to pull it out of multiple massive logs, is instantly available across all my company locations, including road warriors.” CISO, Financial Services Company
  • 34. SECURITY CONERNS WHAT IS PANDA CLOUD PROTECTION? ¿HOW DOES IT WORK? CLIENTS BENEFITS FEATURES INDEX
  • 35. Panda Cloud Protection Portfolio PANDA CLOUD OFFICE PROTECTION PANDA CLOUD OFFICE PROTECTION completo conjunto de soluciones hosted para endpoint , e-mail y tráfico web PANDA CLOUD PROTECTION PANDA CLOUD EMAIL PROTECTION PANDA CLOUD INTERNET PROTECTION PANDA CLOUD OFFICE PROTECTION Complete SaaS security suite that protects all the threat entry points : endpoints, email and web traffic PANDA CLOUD PROTECTION 0
  • 36.
  • 37.
  • 38.
  • 39.

Editor's Notes

  1. Antivirus products require too much time and effort for small and medium sized companies. Once they buy the antivirus, they have to invest time and effort in: Additional hardware such as servers to host a centralized console with the attached services and databases. Additional supporting software licenses such as database software to run protection’s reports or configuration. Complicated security management requires dedicated and skilled personnel - not focused on the core business- to manage and control protection. Many SMBs do not want these hassles because all these tasks distract them from their core business.
  2. SMBs understand full well that they face the same risks and regulations as large organizations. The increasing number of threats makes their protection needs more complex: There are more threats than ever (PandaLabs received more malware last year than in the previous 16 years combined) Malware is silent and more difficult to combat as long as it remains hidden , causing identity theft, financial and productivity losses and other malicious action. This malware landscape that organizations have to face requires a full set of maximized malware detection capabilities. When the SMBs implement a security solution, they have to choose one that provides adequate protection and that adapts to their specific needs . In many cases, their limited resources are not enough to obtain the security levels they require. Small and mid-sized businesses usually lack skilled resources for protecting and managing the security of their networks. They tend to invest all possible resources in their core business activities and this prevents them from assigning an adequate part of their budget to IT security. Most of them invest just enough to get by. They also need a continued monitoring system in order to reduce risk. Remote and branch offices are often geographically distributed and therefore need to be managed remotely from a centralized point. They also need to simplify security management as much as possible and have a continued monitoring service with reduced bandwidth consumption . Home Offices have nobody in charge of security management and they have no budget for security management.
  3. IN CHARGE OF Network management Hardware and Software maintenance Database programming Mail server maintenance and security patching Problem solving hardware and software issues Software installation, updating and deployment Security policy, setup and maintenance (server, database, installation, upgrades) Web. The new Challenge of On-line Order System. Negotiation with vendors IT Responsible for the new Office PROBLEMS 20-30% of time putting out fires Past 2 months has spent 3 days to reinstall 6 computers  Rootkit Administration computer found to be infected with keylogger Had to contact the bank and rescan the network Commercial Rep. are using retail antivirus Uncertain about state of updates for the mobile and remote users Once a week has to travel to remote offices for maintenance (hardware, software and security) Cannot keep up with security, admin. & development tasks Has to deploy
  4. 8 Security as a Service (SaaS) means delivering traditional security applications as an Internet-based service to customers. Subscription service: Since SaaS is a subscription-based service (service vs. product), vendors have greater focus on quality of service and support. This forces to stay on top of quality, maintenance and service. Hosted service: With SaaS, multiple customers use the Internet to make use of a single copy of an application that runs on an Internet-connected server. This requires designing the software to support such multi-tenancy while keeping each customer’s data separate and secure. Being a Hosted service it doesn’t require infrastructure at the customer site. Infrastructure investments and expenses in maintenance, dimensioning when company grows, etc are not needed. High availability 24x7 That means companies must provide high availability 24x7 uptime. To do this, the SaaS company must have servers in a worldclass data center that has redundant UPS power, generator backup, fully meshed Tier 1 connectivity to multiple backbone providers and in-depth 24x7 monitoring, among other features. They must respond immediately to any hardware, software or database administration issues. In addition, SaaS customers demand 24x7 customer support. Web-based interface The application ’s interface is web-based enabling the end-customer access the application through the internet anytime 24x7 from anywhere. Always updated Because SaaS software updates only require changes on a single platform at centrally located servers, rolling out updates is much simpler. Short improvements cycle SaaS companies can constantly see how their users are using their applications in real time. They immediately analyze what is working well and what isn’t. Successful companies use this information to respond quickly by implementing software updates with a shorter cycle than is possible with on premise software. Low TCO The automatic upgrades delivered by SaaS programs result in a lower total cost of ownership (TCO) due to the fact that SaaS eliminates much of the IT effort to solution upgrades. In fact, compared to traditional on-premise installations, SaaS applications have an overall 20%-40% lower TCO, allowing companies to reallocate resources in other areas. Rapid installs also translate into a quicker return on investment.
  5. IN CHARGE OF Network management Hardware and Software maintenance Database programming Mail server maintenance and security patching Problem solving hardware and software issues Software installation, updating and deployment Security policy, setup and maintenance (server, database, installation, upgrades) web. The new Challenge of On-line Order System. Negotiation with vendors IT Responsible for the new Office PROBLEMS 20-30% of time putting out fires Past 2 months has spent 3 days to reinstall 6 computers  Rootkit Administration computer found to be infected with keylogger Had to contact the bank and rescan the network Commercial Rep. are using retail antivirus Uncertain about state of updates for the mobile and remote users Once a week has to travel to remote offices for maintenance (hardware, software and security) Cannot keep up with security, admin. & development tasks Has to deploy
  6. Is it 18 terabytes or 25?
  7. Robust protection Proactive anti-malware protection based on Collective Intelligence for PCs, laptops and servers which detects and eliminates viruses, worms, trojans, spyware, adware, rootkits, bots, hacking tools, unwanted programs and phishing . Locally or centrally managed personal Firewall. Updates are automatic and transparent , ensuring immediate protection with the latest technologies against the latest threats.   Minimal costs No initial investment or hardware and software maintenance . Costs are predictable . No IT specialized, dedicated resources are required. There are no upgrade costs as these are completely automatic .   Minimal resource consumption Panda Security’s light, proactive technologies along with Collective Intelligence minimize resource consumption . Optimized update technologies ensure minimal bandwidth usage.   Easy to use, easy to maintain Startup is immediate , after minimal Web-based configuration, allowing companies to enjoy maximum protection in a matter of minutes, no matter where users are located . Infrastructure maintenance and updates are directly managed by Panda Security . Installation, configuration, reports and security management is performed centrally , from anywhere through a Web console available 24x7   Control Profile-based security policies. Centrally monitor in real time of endpoint security status, scheduled scans results and malware and network attacks detections Detections alerts via email Detection, status and executive reports for the all endpoints or by groups Global security audit   Regulatory compliance Centralized security management , reports , profile-based security policies and periodic audits aid compliance with regulations: SOX, PCI, HIPAA.   Green IT Reduced energy bills, as no dedicated servers are required. Reduced mail server processing, as well as a reduction in usage of bandwidth and local computer resources. Reduced environmental impact through lower energy consumption (CO 2 emissions) Improved corporate image - environmental responsibility
  8. Delay or no need to purchase new hardware Server  Less processing needs means delay purchase or no purchase of new infrastructure or services PCs  PCs no longer need to upgrade memory or CPU Change Fixed for Variable Costs No upfront costs  Pay as you go  Improved Liquidity SaaS can be expensed instead of depreciated
  9. IN CHARGE OF Network management Hardware and Software maintenance Database programming Mail server maintenance and security patching Problem solving hardware and software issues Software installation, updating and deployment Security policy, setup and maintenance (server, database, installation, upgrades) Web. The new Challenge of On-line Order System. Negotiation with vendors IT Responsible for the new Office PROBLEMS 20-30% of time putting out fires Past 2 months has spent 3 days to reinstall 6 computers  Rootkit Administration computer found to be infected with keylogger Had to contact the bank and rescan the network Commercial Rep. are using retail antivirus Uncertain about state of updates for the mobile and remote users Once a week has to travel to remote offices for maintenance (hardware, software and security) Cannot keep up with security, admin. & development tasks Has to deploy
  10. La continuidad del negocio, factor crítico en la realidad económica actual, y el cumplimiento de regulaciones requieren sistemas de protección robustos, fiables y en continua evolución para bloquear todas las vías de entrada de malware.   Sin embargo, las empresas sufren continuos recortes presupuestarios y falta de recursos especializados , que hace imposible la implantación y mantenimiento de las medidas necesarias de seguridad.
  11. Malware por pendrive Rootkits. Análisis en profundidad Inspección del tráfico por el firewall y detección de intrusos