Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


10:38 AM
Dark Reading
Dark Reading
Products and Releases

Panda Security Launches New Line Of SaaS Security Services

New product line leverages company's proprietary collective intelligence technology and software-as-a-service functionality

GLENDALE, Calif., July 28 /PRNewswire/ -- Panda Security, the Cloud Security Company, today announced the general availability of its new line of business security solutions, which includes Panda Security for Business, Panda Managed Office Protection, Panda Managed Email Protection, Panda GateDefender SB, and Panda GateDefender Performa. By integrating improved Software-as-a-Service (SaaS) functionality and leveraging Collective Intelligence across its corporate product portfolio, Panda continues to be at the forefront of cloud protection and SaaS for small and medium size businesses (SMBs).

According to leading analyst firm Forrester Research, the continued rise in targeted malware attacks infecting unsuspecting businesses will force security budgets to rise and focus on protecting data, streamlining costly or manually intensive tasks, and providing security for an evolving IT infrastructure. With this in mind, Panda's technology strategy provides business customers with comprehensive, proactive protection at minimal resource consumption levels and infrastructure investment requirements as compared with traditional endpoint security and managed services offerings.

"By incorporating some of the most advanced technologies in the market, our SMB and enterprise customers are benefiting from a complete line of corporate security solutions that cover all the primary vectors of malware infection including workstations and servers, email, and Web traffic," said Josu Franco, business customer unit director at Panda Security. "Leveraging SaaS and the cloud allows us to successfully protect against the burgeoning threat of cybercrime, while significantly reducing the resource consumption and complexity of security management."

Panda's new line of business security solutions include the following features and benefits:

-- Panda Security for Business: Panda Security's flagship product is a comprehensive endpoint security suite for protecting workstations and fileservers against all types of malware including viruses, rootkits, hackers, online fraud, identity theft and all other Internet threats. The new version includes considerable improvements to the management console and streamlined functionality around managing security updates. -- Panda Managed Office Protection: The latest version of Panda Security's hosted IT security service for SMBs and value added resellers (VARs) serving the SMB market is up to 50 percent more efficient than traditional endpoint security software. It increases overall business efficiency by eliminating the complexity and cost of maintaining traditional client-server corporate solutions and allowing business owners to concentrate on their organizational success. -- Panda Managed Email Protection: Panda Security's new SaaS clean mail service protects corporate email from spam and malware without additional hardware or software investment, thereby guaranteeing effective corporate malware and spam protection at the lowest total cost of ownership. This solution, which replaces the company's TrustLayer Mail service solution, includes a redesigned user interface, better spam and user policy administration and an email backup system that allows continued access to email in the event of a corporate email server failure. -- Panda GateDefender SB: As the only unified threat management (UTM) device that offers a simple "plug and forget" installation, this product is ideal for organizations of up to 50 employees. The product's easy-to-use web-based console has a simple graphic interface and offers total network perimeter protection. The business user-friendly management and competitive price point make it the most complete feature set in this market segment. -- Panda GateDefender Performa: The new version of this scalable and load-balancing perimeter security device has improved anti-spam capabilities based on enhanced functionality that protects against novel threats such as backscatter. Its capability to detect infected machines inside the network perimeter that may be sending spam outside the organization (as is the case with PCs that have become zombies) allows businesses to immediately counteract such invasive security breaches.

The new line of Panda business solutions are available now. For more information, please visit http://www.pandasecurity.com/usa/enterprise/.

About Panda Security

Founded in 1990, Panda Security is the world's leading provider of cloud-based security solutions with products available in more than 23 languages and millions of users located in 195 countries around the world. Panda Security was the first IT security company to harness the power of cloud computing with its Collective Intelligence technology. This innovative security model can automatically analyze and classify thousands of new malware samples per day, guaranteeing corporate customers and home users the most effective protection against Internet threats with minimum impact on PC performance. Panda Security has 56 offices throughout the globe with US headquarters in California and European headquarters in Spain. For more information, log on to http://www.pandasecurity.com/.

SOURCE Panda Security=

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Unreasonable Security Best Practices vs. Good Risk Management
Jack Freund, Director, Risk Science at RiskLens,  11/13/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-11-17
KairosDB through 1.2.2 has XSS in view.html because of showErrorMessage in js/graph.js, as demonstrated by view.html?q= with a '"sampling":{"value":"<script>' substring.
PUBLISHED: 2019-11-17
An issue was discovered in Xorux Lpar2RRD 6.11 and Stor2RRD 2.61, as distributed in Xorux 2.41. They do not correctly verify the integrity of an upgrade package before processing it. As a result, official upgrade packages can be modified to inject an arbitrary Bash script that will be executed by th...
PUBLISHED: 2019-11-17
An integer overflow in the search_in_range function in regexec.c in Oniguruma 6.x before 6.9.4_rc2 leads to an out-of-bounds read, in which the offset of this read is under the control of an attacker. (This only affects the 32-bit compiled version). Remote attackers can cause a denial-of-service or ...
PUBLISHED: 2019-11-17
iTerm2 through 3.3.6 has potentially insufficient documentation about the presence of search history in com.googlecode.iterm2.plist, which might allow remote attackers to obtain sensitive information, as demonstrated by searching for the NoSyncSearchHistory string in .plist files within public Git r...
PUBLISHED: 2019-11-17
jhead 3.03 is affected by: heap-based buffer over-read. The impact is: Denial of service. The component is: ReadJpegSections and process_SOFn in jpgfile.c. The attack vector is: Open a specially crafted JPEG file.