" panda security "

EndPointProtection

Introducing Endpoint Protection

We’ve undergone some changes in the last couple of months and it was only a matter of time before we started updating our products to suit our new identity. This week we released the latest update to what was previously known as Panda Cloud Office Protection and Panda Cloud Office Protection Advanced. Introducing “Endpoint Protection” and “Endpoint Protection Plus.”

(more…)

Fusion-Cover-of-infographic

Panda Cloud Fusion Infographic

Panda Fusion is a cloud-based solution that meets all your needs. It is easy to deploy and scale, as it requires no maintenance or infrastructure investment. Available anytime, anywhere through a simple web browser.

Benefits of Panda Cloud Fusion

  • It offers maximum protection against malware and unknown threats.
  • It reduces costs through optimisation of your IT infrastructure.
  • It provides an optimal support experience, through proactive problem resolution and remote access to users’ devices that is non-disruptive, wherever they are.

See the infographic below for more:

(more…)

PCOP

Panda Cloud Office Protection 7.1: What you need to know

Panda Security, has announced the new features of version 7.1 of Panda Cloud Office Protection (PCOP), Panda’s cross-platform solution that offers the best cloud-based protection.

This version includes improvements aimed at meeting the requirements of medium and large enterprises. Version 7.1 incorporates various technological and functional innovations, with emphasis on providing the user with greater control and management.

The new features include:

  • Content filtering for the Exchange protection, which allows emails to be filtered by the extension of the attachment, neutralizing dangerous attachments or attachments with a multiple file extension. All content gets filtered before it arrives at the endpoint, endpoint performance is unaffected.
  • White-lists included in device control. This feature allows different exclusions to be applied to different groups of computers selected by profile. In addition, white-listed devices can be used without any restrictions, regardless of the settings.
  • Mobile device control. This option allows the user to block access to mobile devices and white-list devices.
  • New local console on the endpoint. This console provides PCOP administrators and partners with a tool to enable or disable the endpoint protection in a rapid and timely manner, making troubleshooting easy and painless.
  • Ability to upgrade to new versions from the PCOP Web console. Notifications will appear in the console to indicate that a new version is available. Administrators then decide to apply the latest version from the console.

For more information on PCOP click here.

Cybercrime

The Era of Cyber-crime – Don’t Fall Victim

There has been an increase in cyber-attacks on high profile companies recently – JP Morgan Chase, Target and Home Depot as well as breaches in online services such as iCloud, Dropbox and Snapchat.

A cyber-attack is defined as – any type of offensive action employed by individuals or whole organizations, that targets computer information systems.

With each new attack it’s increasingly clear, no company is immune to cyber-attacks and preparation is key to mitigating risk.  This preparation must start with a commitment at the very top of the company. With a top-down approach and directors who are actively engaged, companies stand a greater chance of protecting their shareholders’ interests in cyberspace.

The companies that are most often targeted are financial institutions, healthcare organisations, major retailers and online/cloud storage services.

The most recent attacks, used methods that are:

  • Sophisticated – exploiting weak points, using backdoor controls and advanced malware.
  • Social – targeting specific people with social engineering and stealing and using valid credentials.
  • Stealthy – implemented in a series of low profile moves that are undetectable to standard security or hidden among thousands of logs collected daily.

(more…)

PUPs Cover

PUPs: What are they and how to avoid them?

What is a PUP?

PUP stands for Potentially Unwanted Program. This term was adopted as a more consumer friendly version of what was commonly called Grayware. Both terms accurately describe the software, because although it may not be illegal software in most cases – it is often unwanted software. It is common for security products to include PUP detection to some degree as this type of software does have an effect on the end user experience.

(more…)