Key Features Benefits|Key Differentiators|Minimum requirements|More information
Centralized all-in-one console
All protections are managed from a single centralized point
Most advanced proactive technology
The most recognized proactive technologies, composed of intrusion prevention, proactive detection and behavioral analysis
In-depth malware audits
Malware Radar is capable of uncovering and disinfecting advanced hidden threats
Network access control
P revents infected, insecure or compromised PCs from connecting to your network and contaminating your files and data
Anti-spam for desktops Exchange and Domino Servers
Based on Recurrent Pattern Detection™ (RPD™) , a content-agnostic technology that detects and blocks spam in any language
Exhaustive content filtering
Content filters operate either on the content, the information contained in the mail body, or on the mail headers (like "Subject:") to either organize, accept or reject a message.
High-performance virus and spam filtering for mail transfer agents (MTA)
Ensures complete email protection for Qmail, Sendmail and Postfix. Gets the most out of your email servers resources. Reduces management and maintenance time thanks to their web based management console.
Anti-malware protection and content filtering for Microsoft ISA servers
Ensures the robustness of your security policies. Stops the spread of infections on local networks. It scans all file formats sent and received. It does this using a Web filter (ISAPI) and an application filter through HTTP, SMTP and FTP (over HTTP).
Application control
Allows administrators to have complete control over endpoint and network resources
Real- time information
Wide range of detailed detection activity reports which can be customized and configured to be sent periodically to administrators.
Centrally-managed Quarantine
Help controls suspected files and determine the actions to take. It includes the possibility to send suspicious files to PandaLabs for analysis.
Key Features Benefits Key Differentiators|Minimum requirements|More information
Maximizes return of investment
Provides a converged, single-priced solution complemented with host-based intrusion prevention, access and application control and targeted attack audits
Complete centralized monitoring of all the corporate network computers.
The AdminSecure management console allows the administrator to manage the global security of the network from one or more points (in the case of additional administrators), optimizing computer productivity and allowing centralized policies to be applied quickly and efficiently.
Efficient and scalable solution.
The different modules included in each solution offer each company, regardless of its size, the right security level for its system structure.
Ensures corporate policy fulfillment and optimizes employer productivity.
The administrator can distribute policies to the computers, and block access to restricted applications or files from the central console.
Simplifies risk management.
Corporate solutions enable automatic in-depth audits to detect hidden malware that could have gone unnoticed during other scans (MalwareRadar).
Protects your company's critical assets.
Proactive technologies provide an additional protection layer against all types of unknown malware, targeted attacks and Internet threats.
Key Features|Benefits Key Differentiators Minimum requirements|More information
The most advanced intrusion protection system
Panda's TruPrevent Technologies represent the most complete and advanced HIPS (Host Intrusion Prevention System) on the market.
In-depth malware audits
Panda is the only vendor that includes an extra layer of protection (Malware Radar) that allows organizations to detect and disinfect hidden malware that has bypassed the traditional protection barrier.
Centralized all in one console.
The centralized console (AdminSecure) allows to easily manage all network protection. A complete dashsboard provides real-time information about the detection activity giving the administrators the perfect tool to reduce risk.
Collective Intelligence
Exponentially increases malware detection like no other solution on the market.
Key Features|Benefits|Key Differentiators Minimum requirements More information
Console, administration server and repository:
- Internet Explorer 5.5 or higher
- Windows Installer 2.0
- SO: Windows 2000/XP/Vista (32 y 64 bits), Terminal Server, Windows 2000 SBS, Windows Server 2003 Enterprise Edition/SBS/R2, Windows Server 64bits, Windows Server 2008 (32 and 64bits)
Desktops and servers
- OS: Windows 2000/XP/Vista/W7 (32 and 64 bits), WEPOS 1.1, Tablet PC and WEPOS Ready 2009.
- Windows Server 2000 Domain Controller, StandAlone, Terminal Server, SBS and cluster. Windows Server 2003 (32 and 64 bits) Enterprise Edition/SBS/SP1/SP2/Cluster/R2 (32 and 64 bits), Windows Server 2008/SBS/R2 (32 and 64 bits)
- Debian 3.1, 4, 5, Ubuntu 7.04, 9.10, OpenSUSE 10.1,10.2, 11.2 and Enterprise 10, Fedora Core 6, Red Hat Enterprise 4 (Desktop, Workstation, Server) and 5 (Client), Mandriva 2007.1
E-mail servers
- Applications: Exchange 2000/2003 (SP1), 2007 (SP1/SP2), 2010
- RAM: 512MB (2000)/ 1GB(2003)/ 2GB (2007)
- Hard disk: 200MB (2000/2003)/ 250MB (2007)
- OS: Windows 2000 Server (SP3), 2000 Advanced Server, Windows Server 2003 Enterprise Edition SP1(32 and 64 bits), Windows Server 2003 R2 (32 and 64 bits), Windows Server 2008
Domino Servers
- RAM: 256MB
- Hard disk. 200MB
- SO: Windows 2000 Server SP1, Windows 2003 Server/SP1/R2
- Applications: Lotus Domino 4.5 o superior (8.5 incluido)
ISA Servers
- ISA 2004 (Standard/Enterprise) y 2006 (Standard/Enterprise)
- RAM: 1GB
- SO: Windows 2000 server, Advanced Server SP4, Windows Server 2003/R2
Placeholder for Fifth Card Tab. Afected by DivMain, DivBody, DivCentral-Int, DivContent & DivCard5
Key Features|Benefits|Key Differentiators|Minimum requirements More information
Placeholder for Sixth Card Tab. Afected by DivMain, DivBody, DivCentral-Int, DivContent & DivCard6
A scalable, modular solution
Panda Security for Enterprise is built around the following modules:
- Management
- Protection for Endpoints
- Protection for Mail Servers
- Protection for Gateways
Panda Security Store