theDocumentId => 1131616 Panda Security Launches New Line Of SaaS Security ...

Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

7/28/2009
10:38 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Panda Security Launches New Line Of SaaS Security Services

New product line leverages company's proprietary collective intelligence technology and software-as-a-service functionality

GLENDALE, Calif., July 28 /PRNewswire/ -- Panda Security, the Cloud Security Company, today announced the general availability of its new line of business security solutions, which includes Panda Security for Business, Panda Managed Office Protection, Panda Managed Email Protection, Panda GateDefender SB, and Panda GateDefender Performa. By integrating improved Software-as-a-Service (SaaS) functionality and leveraging Collective Intelligence across its corporate product portfolio, Panda continues to be at the forefront of cloud protection and SaaS for small and medium size businesses (SMBs).

According to leading analyst firm Forrester Research, the continued rise in targeted malware attacks infecting unsuspecting businesses will force security budgets to rise and focus on protecting data, streamlining costly or manually intensive tasks, and providing security for an evolving IT infrastructure. With this in mind, Panda's technology strategy provides business customers with comprehensive, proactive protection at minimal resource consumption levels and infrastructure investment requirements as compared with traditional endpoint security and managed services offerings.

"By incorporating some of the most advanced technologies in the market, our SMB and enterprise customers are benefiting from a complete line of corporate security solutions that cover all the primary vectors of malware infection including workstations and servers, email, and Web traffic," said Josu Franco, business customer unit director at Panda Security. "Leveraging SaaS and the cloud allows us to successfully protect against the burgeoning threat of cybercrime, while significantly reducing the resource consumption and complexity of security management."

Panda's new line of business security solutions include the following features and benefits:

-- Panda Security for Business: Panda Security's flagship product is a comprehensive endpoint security suite for protecting workstations and fileservers against all types of malware including viruses, rootkits, hackers, online fraud, identity theft and all other Internet threats. The new version includes considerable improvements to the management console and streamlined functionality around managing security updates. -- Panda Managed Office Protection: The latest version of Panda Security's hosted IT security service for SMBs and value added resellers (VARs) serving the SMB market is up to 50 percent more efficient than traditional endpoint security software. It increases overall business efficiency by eliminating the complexity and cost of maintaining traditional client-server corporate solutions and allowing business owners to concentrate on their organizational success. -- Panda Managed Email Protection: Panda Security's new SaaS clean mail service protects corporate email from spam and malware without additional hardware or software investment, thereby guaranteeing effective corporate malware and spam protection at the lowest total cost of ownership. This solution, which replaces the company's TrustLayer Mail service solution, includes a redesigned user interface, better spam and user policy administration and an email backup system that allows continued access to email in the event of a corporate email server failure. -- Panda GateDefender SB: As the only unified threat management (UTM) device that offers a simple "plug and forget" installation, this product is ideal for organizations of up to 50 employees. The product's easy-to-use web-based console has a simple graphic interface and offers total network perimeter protection. The business user-friendly management and competitive price point make it the most complete feature set in this market segment. -- Panda GateDefender Performa: The new version of this scalable and load-balancing perimeter security device has improved anti-spam capabilities based on enhanced functionality that protects against novel threats such as backscatter. Its capability to detect infected machines inside the network perimeter that may be sending spam outside the organization (as is the case with PCs that have become zombies) allows businesses to immediately counteract such invasive security breaches.

The new line of Panda business solutions are available now. For more information, please visit http://www.pandasecurity.com/usa/enterprise/.

About Panda Security

Founded in 1990, Panda Security is the world's leading provider of cloud-based security solutions with products available in more than 23 languages and millions of users located in 195 countries around the world. Panda Security was the first IT security company to harness the power of cloud computing with its Collective Intelligence technology. This innovative security model can automatically analyze and classify thousands of new malware samples per day, guaranteeing corporate customers and home users the most effective protection against Internet threats with minimum impact on PC performance. Panda Security has 56 offices throughout the globe with US headquarters in California and European headquarters in Spain. For more information, log on to http://www.pandasecurity.com/.

SOURCE Panda Security=

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-32686
PUBLISHED: 2021-07-23
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In PJSIP before version 2.11.1, there are a couple of issues found in the SSL socket. First, a race condition between callback and ...
CVE-2021-32783
PUBLISHED: 2021-07-23
Contour is a Kubernetes ingress controller using Envoy proxy. In Contour before version 1.17.1 a specially crafted ExternalName type Service may be used to access Envoy's admin interface, which Contour normally prevents from access outside the Envoy container. This can be used to shut down Envoy rem...
CVE-2021-3169
PUBLISHED: 2021-07-23
An issue in Jumpserver 2.6.2 and below allows attackers to create a connection token through an API which does not have access control and use it to access sensitive assets.
CVE-2020-20741
PUBLISHED: 2021-07-23
Incorrect Access Control in Beckhoff Automation GmbH & Co. KG CX9020 with firmware version CX9020_CB3011_WEC7_HPS_v602_TC31_B4016.6 allows remote attackers to bypass authentication via the "CE Remote Display Tool" as it does not close the incoming connection on the Windows CE side if t...
CVE-2021-25808
PUBLISHED: 2021-07-23
A code injection vulnerability in backup/plugin.php of Bludit 3.13.1 allows attackers to execute arbitrary code via a crafted ZIP file.