Tag Archives: Panda Security

Why Adaptive Defense 360?

AD-360

A few days ago we published an interview on why Adaptive Defense was the solution against ransomware like Cryptolocker. Now, however, I’d like to go into further details on why Adaptive Defense 360 isn’t just the present and future for just Panda, but rather for the entire cyber security industry.

Adaptive Defense 360 is the only solution available on the market that offers the full protection of a traditional antivirus, white listing, and protection against advanced threats all in one. In fact, it combines all of the capabilities of two product categories in one – EPP (Endpoint Protection Platform) and EDR (Endpoint Detection and Response).

So, how can we make it stand out, in a way that shows Adaptive Defense to be a unique and essential option, to other products on the market?

Differences between Adaptive Defense 360 and a traditional antivirus

  1. An antivirus lacks proactive detection and doesn’t classify all of the applications. Instead, it just classifies those which it has previously listed as malware while Adaptive Defense classifies all running applications, be they goodware or malware, known or unknown.
  2. An antivirus means a certain level of work for the administrator – management of the quarantine, dealing with false positives, etc. On the other hand, Adaptive Defense is a managed service and these types of tasks are taken care of automatically by Panda.
  3. An antivirus doesn’t offer traceability for the actions taken by a malware, meaning that it doesn’t give any forensic details about the attack. Adaptive Defense, however, offers detailed feedback on every action taken by a threat.

Differences between Adaptive Defense 360 and white listing

  1. The main inconvenience of managing by white listing has always been the amount of time required to look after it. This is time that could be better used by the administrator. With Adaptive Defense this inconvenience is removed and Panda looks after the management of the task.
  2. What’s more, the deployment of these services is extremely complex. With Adaptive Defense it’s more akin to child’s play, thanks to it being a cloud based service with one agent in every endpoint.
  3. Above all, a white list doesn’t protect vulnerable applications, or applications that suddenly begin acting strangely. This is something which Adaptive Defense detects and blocks.

Differences between Adaptive Defense 360 and an Advanced Threat Defense (ATD) such as FireEye, PaloAlto, SourceFire, etc)

  1. An ATD solution doesn’t cover all of the possible vectors of infection, but rather only threats that enter via the internet. This leaves you vulnerable to attacks via the USB port, for example. This doesn’t happen with Adaptive Defense as, due to being at the endpoint, it detects all attacks no matter where they come from.
  2. ATDs monitor threats by sandboxing, which means they do it in controlled settings. This allows a threat to behave in different ways to a normal situation making it harder to catch – Panda Adaptive Defense 360 monitors the endpoint in real-time, meaning that no threat can escape its analysis.
  3. ATDs don’t avoid or block attacks, which is one of their main limitations. Adaptive Defense, however, is capable of automatically detecting and blocking any threat that is found at the endpoint.
  4. Finally, if an ATD finds a threat it needs either a third party solution or a manual intervention to correct it. With Adaptive Defense 360 this is all taken care of automatically and immediately.

When all is said and done, we can see that Adaptive Defense 360 is way ahead of other options available on the market. It excels not only against traditional threats but also with vulnerable applications and advanced threats.

Adaptive Defense 360 continuously analyzes the system’s activity so as to determine how to classify every process being carried out as goodware or malware, without leaving room for doubt, and closes the circle of detection with the solution built in.

Do you want more information?

TRY ADAPTIVE DEFENSE

 

Paula Quirós. CMO Panda Security

The post Why Adaptive Defense 360? appeared first on MediaCenter Panda Security.

Spying on your company’s emails can be as easy as (literally) coupling into its optical fiber

router

Five minutes. That is the time needed for an attacker to intercept your company’s communications in the most simple and alarming way. Unfortunately, they don’t have to circumvent complex security measures, install malware on the employees’ computers or anything like that.

The legendary hacker Kevin Mitnick, once convicted cybercriminal and now renowned expert in computer security, has shown that coupling the optical fiber connection of a company or an individual is too easy for someone with evil intentions and the right skills.

Replicating the usual configuration of an office’s network, Mitnick simulates a daily situation: any employee sends an email that, before reaching its destination, will stop on a server (represented by a second laptop in the demo, for practical reasons).

Attackers do not require physical access to any of the two computers. Their task is limited to finding a point where they can intercept the optical fiber. As shown in the video, they can couple into any cassette or junction box carrying the cable before it reaches the victims office or home.

Probably you have seen these cassettes when the technician on duty went to install them. They are usually stacked in a box in the telecommunications room (RITI) of the building, a room that is usually in the garage or in the access floor – or maybe it is the same where the electricity meters are.

If the room is closed with a key, probably it won’t be the place chosen by an intruder to hack the connection. Still in the building, on the upper floors, he could tap the junction box where the cables which end in every home or office start. And also outside the building, on the street, the cybercriminal can find somewhere to couple the cable.

optical fiber

Once located the spot, the attacker will tap the communication thanks to a small ordinary device. Known as ‘clip-on coupler‘, is a device that technicians use for maintaining and identifying the cables. Mitnick used it on his show, and a specific software installed in the computer, to intercept data packets travelling by optical fiber.

This time is the email (and its content, an important password) that ends up in the hands of the fictional attacker. In a real scenario, the cybercriminal could spy any communication that is not encrypted. Moral: do not send passwords, confidential reports or other sensitive material unencrypted via e-mail.

How to prevent your optic fiber from being coupled

  • Restrict access to the optic fiber cabinets to authorized personnel.
  • Use secure tools for sharing files and information.
  • And common sense.

The post Spying on your company’s emails can be as easy as (literally) coupling into its optical fiber appeared first on MediaCenter Panda Security.

Panda’s Security 25th anniversary party

On June 25th, we celebrated the 25th anniversary of Panda Security. It is possible that you may be wondering how the celebration was so… here are some pictures!

diego navarrete

DIEGO NAVARRETE, PANDA SECURITY CEO, WELCOMING THE ATENDEES

 

panda awards

PANDA INNOVATION AWARDS

 

dj

LET’S GET THE PARTY STARTED!

 

party

WE COULD NOT HAVE HAD BETTER COMPANY!

 

brindis

HAPPY 25TH ANNIVERSARY!

If you wish to see more… here is the video!

The post Panda’s Security 25th anniversary party appeared first on MediaCenter Panda Security.

25 years of security and innovation

It’s Panda’s Birthday. But this 2015 is not an ordinary anniversary. Tomorrow, June 25th, we turn 25, no more, no less!

Panda was born in 1990, which was also the date of the World Wide Web development, what a coincidence, right? It has been 25 years in which we had time to do many things but, at the same time, time has flied! 25 years researching, developing, analyzing and protecting our customers, both corporate and home users, against all Internet threats.

Despite all we could tell you here, it wouldn’t be enough! So, we think the best thing that we can do is to give you an overview of our 25 years of history with images. Thank you so much to all of you who have been part of it! :)

panda software

 

CeBIT 2001

CeBIT 2001

 

Bilbao Offices

Bilbao Offices, 2001

 

cebit, 2002

CEBIT, 2002

 

Cebit

CEBIT, 2003

 

PandaLabs

9 years ago… PandaLabs (2006)

 

panda - one step ahead

 

1st security blogger summit

1st Security Blogger Summit, 2009

 

panda-tres cantos

Old Offices in Tres Cantos (Madrid)

 

panda - the cloud security company

 

panda booth

Panda Booth at SIMO. 2007

 

open-windows

Open Windows Premiere. Madrid. 2014

 

news conference

Introducing Panda Security 2015 to the Media

 

Panda Security logo

 

Panda Kick Off

Panda Kick Off. Bilbao. 2015

 

simplexity

We’re Simplexity!

 

Congratulations and let’s enjoy another 25 years together! :)

 

birthday cake

The post 25 years of security and innovation appeared first on MediaCenter Panda Security.

Panda Security reached again 100% protection rate in AV-Comparatives’ tests

Panda Cloud Antivirus has achieved a 100% of malware detection rate, according to the last results published by AV-Comparatives in their montly report “Real-World Protection Tests”.

malware detection

The best news is that we have accomplished these results for two months in a row, Panda Cloud Antivirus’ efficiency and effectiveness is indisputable. This is an example of our capacity to improve and grow as a company.

Here you can get the complete report file, and the dynamic chart from the AV-Comparatives web.

The post Panda Security reached again 100% protection rate in AV-Comparatives’ tests appeared first on MediaCenter Panda Security.

Try our Beta and win 600€ on Amazon!

2016 beta contest

We launched the beta for our Panda Security 2016 range!

And we will like to ask you for your help! We will love if you could use it, have a look around and give us some feedback! We will appreciate your ideas, comments, and suggestions on what you liked best and, especially, what could be improved.

For a chance to win a 600€ Amazon Gift Card!

How to enter this giveaway? Through our channels in Facebook, Twitter (using the hashtag #PandaBeta), Google+ or by leaving a comment on this article.

Panda Security 2016 Beta Contest

What do you have to do? Download our beta and give us your opinion.

Dates: from June 15 to July 6.

How? Through our official channels.

banner en

The post Try our Beta and win 600€ on Amazon! appeared first on MediaCenter Panda Security.

Security in SaaS World

If you are a business owner, probably one of the things you wonder is how to monitor all your devices?

Well, with Systems Management you can manage and maintain them easily and affordably, whether they are in the office or on remote.

Systems management allows you to optimize your IT infrastructure’s performance by automating its management and its centralized control.

Plus, you will be able to resolve your users’ incidents accessing their computers and devices remotely and in a non-intrusive way, wherever they are.

Try our IT management software and technical support!

saas security

If you want to share this infographic, here you have the code!

The post Security in SaaS World appeared first on MediaCenter Panda Security.

Interview with Diego Navarrete, Panda Security CEO

Panda CEO

January 2015; it has been a year since you arrived at Panda, how has the company changed in the past months?

The company did go through three mayor changes during this time:

The first one, and probably the most important, is return to growth. Results we are achieving now show that the market is responding positively to our approach. This is important because restores our confidence, both towards the market, and also, to all our employees and the work every one of them does.

The second change and, the most visible, is our new corporate image. Mixes the best of the “Panda culture” with the targeted change and reinforcement of the company’s values: people-centric, innovative and non-conformist.

The third is, our investment on the future, the advance security solutions led by Adaptive Defense. Thanks to these we are again innovation leaders in the security industry.

Which are the main strategic objectives set for this year? And for the coming ones?

We have a strategic plan for 2015-2019 based on three pillars:

  1. Technology: with three key opportunities over the next years:
  • Mobility: solutions must be multi device and ensure protection and global coverage.
  • Internet of Things: there are more and more connected devices and therefore more protection and security is needed.
  • Advanced Threats: only solved with massive data analysis in the cloud.
  1. International expansion: our clients are global and mobile and we have to continue being so. We will addressed this in three steps:
  • Complete geographies where we are already strong: Western Europe, Latin America and USA. During 2015 we opened new country partners in those countries in Latin America that had no coverage before, like Panama.
  • Open new markets in emerging countries and economies where we don’t have a strong presence. For example, India or China.
  • Complete the acquisition and conversion of subsidiaries in countries which become important to our business, such as Italy and Denmark, both in the process of incorporation.
  1. Growth,  the necessary proof that we are doing a good job, also with three key areas:
  • Maintain the organic growth of the current product portfolio.
  • Continue with the improvement and growth ratio in our Web offer.
  • Prove that Adaptive Defense gives the expected results.

Diego Navarrete

The company’s profits are distributed almost 50% between retail products and corporative products, will this trend continue?

Device protection nurtures of the same base technology for both markets. We will keep these two lines although it is true that in retail, the margins are narrowing and in corporate, especially with Advanced Threats protection, clients’ investments are increasing significantly.

Three reasons why Panda is a global company.
  • Because 85% of our business is outside Spain.
  • Because 50% of our employees are outside Spain (HQ).
  • Because cyber-attacks are global and so is their defense.
Which are the most important threats in cyber security users might face? And companies?

For the user the most serious is still the theft of personal information and the use of that data for criminal purposes.

In the corporate field, we cannot forget that the jewel in the companies crown are also their information and applications. However, they have also other requirements set by the industry for which they have to comply with general and industry specific regulation.

How do you see the market? Does it tend to free products?

The power has clearly shifted from the organizations to the individual. The best way of convincing him of the value of your solutions is for him to try them first and then, if he likes them and they add value, he will pay for them.

In the corporate market there have always been pilots and free trials. Now is the individual who has the possibility of trying the service before purchasing it.

I like this model because it forces us to improve and think continuously about the user experience.

At Panda we talk about the ‘Internet of Things’, ‘Big Data’, ‘Cloud Computing’, mobility. What role plays security here?

Panda has been working with Cloud and Big Data since 2007, a fortress and at the same time a necessity because the number of attacks multiplies every year. To analyze 225.000 malware samples that arrive daily to our servers we need to benefit from this technology. In addition, the Cloud allows us to give almost instantly and in real time solution to these security problems.

After visiting subsidiaries and country partners, how do you think Panda is perceived thorough the world?

As a company with great technology, close to the user, which is going through a transformation moment.

Something you are proud of?

I am very proud of two things: the decision I made 15 months ago, when I decided to join this project, and the human team I have come across.

And finally, why Panda?

Because we are reinventing ourselves and at the same time we are reinventing the industry, because we develop innovative and of the future technology with a clear vocation of service, because is a leader company and it has a fantastic human team.

The post Interview with Diego Navarrete, Panda Security CEO appeared first on MediaCenter Panda Security.

Try our Beta and win 200€ on Amazon!

2016 beta contest

Today we are launching our Panda Security 2016 rage beta!

And we will like to ask you for your help! We will love if you could use it, have a look around and give us some feedback! We will appreciate your ideas, comments, and suggestions on what you liked best and, especially, what could be improved.

For a chance to win a 200€ Amazon Gift Card! Among the most useful comments we will give away not one, but 9 gift cards!

How to enter this giveaway? Through our channels in Facebook, Twitter (using the hashtag #PandaBeta), Google+ or by leaving a comment on this article.

Panda Security 2016 Beta Contest

What do you have to do? Download our beta and give us your opinion.

Dates: from May 19 to June 9.

How? Through our official channels.

banner en

The post Try our Beta and win 200€ on Amazon! appeared first on MediaCenter Panda Security.

Panda Security reached 100% protection rate in AV-Comparatives’ tests

We have great news! Panda Security has obtained excellent results in April’s Real World Protection Test! And we are not the ones that say it! ;)

According to AV-Comparatives, we have achieved 100% detection rate in the tests conducted by this independent institute with a worldwide reputation.

av comparatives april

These results can only confirm the great results provided by the XMT™ scan engine, which is now included in all consume products.

Panda Security develops their products in response to the evolution of malware in recent years. Therefore, the XMT™ engine is the most effective response against threats like Cryptolocker and ransomware, of which we have all heard so much about in the last few months.

XMT antivirus

For example, in Spain, people are receiving an email that supposedly comes from the national post service informing you that a package has arrived and you have to collect it. But once you download it, it kidnaps your computer’s and asks you for a ransom if you want it back.

But we are not satisfied with these great results. Our objective is to keep up with the latest threats, so we can build a safer world. Try our free antivirus and enjoy the maximum protection!

The post Panda Security reached 100% protection rate in AV-Comparatives’ tests appeared first on MediaCenter Panda Security.