Founded in 1990, Panda Security is the world’s leading provider of cloud-based security solutions, with products available in more than 23 languages and millions of users located in 195 countries around the World. Panda Security was the first IT security company to harness the power of cloud computing with its Collective Intelligence technology. This innovative security model can automatically analyze and classify thousands of new malware samples every day, guaranteeing corporate customers and home users the most effective protection against Internet threats with minimum impact on system performance. Panda Security has 80 offices throughout the globe with US headquarters in Florida and European headquarters in Spain.
Panda Securityn Pohjoismaiden toiminnot hoitaa Panda Security Sweden AB, ja Suomen toimistomme sijaitsee Tampereella osoitteessa Haarlankatu 1 F.
Panda Security on perustettu vuonna 1990, ja alusta asti olemme valmistaneet antivirustuotteita sekä yrityksille että kuluttajille. Tuotevalikoimamme on sittemmin laajentunut muun muassa palomuuri- ja sovellusanalyysiratkaisuihin sekä softatyökaluihin.
Suomen myyntiorganisaatio keskittyy ensisijaisesti yritystuotteisiin, ja esittelemme tuotteita webinaareilla. Tuotteista on saatavissa kokeiluversiot, ja opastamme tuotteiden käyttöön suomeksi ja englanniksi.
Panda
Fusion
The global solution for managing the security and IT infrastructure of your company
Cloud-based
Security, Management and Support
MANAGE THE ANTIVIRUS ON ALL DEVICES IN YOUR NETWORK,
AND PROVIDE
REMOTE TECH SUPPORT TO YOUR EMPLOYEES
Fusion is a complete product able to protect, manage and deliver remote support to all your IT devices, including smartphones and tablets. As it is a cloud solution, it is deployed rapidly without the need for maintenance or costly
investments in server infrastructure.
Accessible from anywhere and at any time, Fusion is managed from a simple browser, and offers:
Maximum protection against malware and other unknown threats.
Cost savings thanks to the automation of infrastructure management and centralized control.
The best support experience with proactive troubleshooting and remote, non-intrusive access to devices, no matter
where they are.
DISCOVER FUSION IN DEPTH
Maximum security
Maximum detection of malware and zero-day exploits.
Protection for all network devices including Exchange mail servers, and Android smartphones and tablets.
Controls external devices to minimize malware entry points.
Minimizes vulnerabilities by keeping all of the software used in the company updated.
The anti-theft feature prevents data loss on lost or stolen smartphones and tablets.
Centralized management and control
Permanent visibility into all your hardware and software, including Windows, Linux and Mac OS X workstations and servers, Android and iOS smartphones and tablets, printers, and computer networks.
Proactively monitor the status of managed devices and reduce incidents through automatic updates
Automate the most common IT tasks freeing up time for other projects and value-added tasks.
Enforce security policies and optimize device power consumption
Monitor and block user Web browsing by category.
Proactive tech support
Remotely monitor and provide tech support to all devices, even if they are switched off or out of the office.
Use non-intrusive diagnosis and troubleshooting to boost user productivity.
Organize, classify and prioritize incident management, sharing documentation and technical procedures for quicker resolution.
Real-time device inventory
Control and monitoring of CPU and memory usage, disk space, services, software, etc. on corporate network devices.
Performance graphs.
Software and hardware change logs.
License management.
MORE BENEFITS OF FUSION
TICKET SYSTEM FOR IT
Fusion incorporates a ticket system to organize and classify user incidents and shared troubleshooting procedures.
REMOTE CONTROL AND MESSAGING
Fusion allows you to remotely access the desktop of all users on the corporate network (shared access or total control), or communicate with them through a messaging system.
PROFILE-BASED CONFIGURATION
Assign different protection polices to users through configuration profiles.
Apply different levels of protection according to the profile of the user who connects to your corporate network.
DEVICE CONTROL
Prevent malware entry and data leaks by blocking device categories: USB memory sticks and modems, webcams, DVD/CD drives, etc.
In addition, you can establish exceptions with device whitelists, or simply block certain dangerous actions (access, read, write) on protected devices.
FLEXIBLE AND RAPID INSTALLATION
Deploying Fusion across complex networks has never been easier.
Install the solution on your devices through an email with a download URL, or transparently by selecting each device in the built-in deployment tool (compatible with Active Directory, Tivoli, SMS, etc.).
MALWARE FREEZER
Avoid false positives with Malware Freezer. Freeze the malware detected for seven days and, if it is a false alarm, automatically restore the file on the user's system.
TECHNICAL REQUIREMENTS
Web Console
Internet connection.
Internet Explorer 8.0 or later
Mozilla Firefox 3.0 or later
Google Chrome 2.0 or later
Internet connection
Operating systems (workstations): Windows 2000 Professional,
Windows XP SP0 & SP1 (32 and 64-bits) XP SP2 and later, Vista,
Windows 7, Windows 8.1 (32 and 64 bits) and Windows 10 (32 and
64 bits).
Operating systems (servers): Windows 2000 Server, Windows
Home Server, Windows 2003 (32, 64 bits and R2) SP1 and greater,
Windows 2008 32 and 64 bits, Windows 2008 R2 (64 bits),
Windows Small Business Server 2011 and Windows Server 2012 (64
bit and R2).
For MAC workstations / file servers
Mac OS X 10.6 Snow leopard, Mac OS X 10.7 Lion, Mac OS X 10.8
Mountain Lion, Mac OS X 10.9 Mavericks, Mac OS X 10.10 Yosemite,
Mac OS X 10.11 El Capitan.