Tag Archives: Panda Security

Fusion: Cloud Security, Management and Support for your IT network

You know Fusion is an integrated solution that provides security, management and remote support for all devices on your IT network.

Why Fusion?

  • Because you will not require any additional infrastructure to centrally manage all your customers end points, smartphones and tablets. The solution is 100% cloud hosted.
  • Because it offers maximum protection against malware thanks to Collective Intelligence and anti-exploit technologies against unknown threats.
  • Because it reduces costs through optimization of your IT infrastructure, automation of management tasks and centralized control.
  • Because it provides an optimal support experience to your end users, through proactive problem resolution and remote, non-disruptive access to their devices, wherever they are.

Try Fusion! The global solution to manage your company’s security and IT infrastructure!

The post Fusion: Cloud Security, Management and Support for your IT network appeared first on MediaCenter Panda Security.

ICSA stands out Panda Security for 15 years of excellence

icsa labs

The good performance and the excellence of Panda Security has been recognized by ICSA (International Computer Security Association) because of having received quality certifications on their products for the last 15 years.

Panda Security received the 15 year ICSA Labs’ Excellence in Information Security Testing (EIST) Awards which recognizes Panda’s “outstanding achievements” maintaining the quality certification of their products during these 15 years.

Stephen Gaus, ICSA Labs Business Development gave the award to Luis Corrons, Technical Director of Panda Labs during the RSA 2015 Conference in San Francisco.

luis corrons icsa

This distinction recognizes the resources, dedication and efforts invested by Panda Security to maintain this certification. Also highlights the “willingness to persevere the quality” of their products to benefit their customers and the security universe.

Congratulations to all! :)

The post ICSA stands out Panda Security for 15 years of excellence appeared first on MediaCenter Panda Security.

When printers and routers become weapons to make web pages fall

printer

A single denial-of-service attack (DDoS) can make medium and large companies loose tens or hundreds of thousands of euros, according to most studies published in recent months.

As we have mentioned before, this kind of attacks consist on saturating the servers that store the files of a platform or web service. As a result, the access to the servers is suspended with the resulting interruption in the exchange of information.

Cybercriminals used tools or malware installed in one or several computers to perpetrate their crimes so far, but now they have expanded their horizons. Recently, Chinese researchers have found that criminals can launch DDoS through printers, webcams or even routers.

router

Asian experts have analyzed one of the greatest denial-of-service attacks that has ever happened. It took place in December 2014 and paralyzed the online gaming services of Sony and Microsoft for several days.

According to this investigation, the 30% of the devices accessing the servers until they were blocked were connected to the network. Cybercriminals had taken over the routers using a malware that attacked devices with weak passwords or security holes.

However, now is not even necessary to install any malware. Experts have identified an increasing technique that controls these devices based on the SSDP communication protocol, a channel mainly used by these peripherals to communicate with computers.

The SSDP is designed to send information, feature that the attackers use as leverage. If many printers send information repeatedly to the server where the web page is hosted, the outcome is likely to be a DDoS which will make the site crash.

office with computer

Since this technique is so simple, it has a huge potential to be spread. It is easier to control these devices than a computer, and the amount of routers, printers and other office devices an attacker might use increases the efficiency of the attack.

Furthermore, the possibilities grow with the arrival of the Internet of Things in companies and homes. Smart TVs, thermostats and even cars are open doors for cybercriminals.

Although is difficult to avoid DDoS, it is possible (and we advise you should) to monitor the passwords to connect any device to the network. At least, we will be able to discourage cybercriminals from attacking.

The post When printers and routers become weapons to make web pages fall appeared first on MediaCenter Panda Security.

10 commandments for remote desktop managers – Infographic

 

10-commandments-desktop-managers1

Try Systems Management, the new way to manage, monitor and support IT systems!

If you want to share this infographic, here you have the code:

The post 10 commandments for remote desktop managers – Infographic appeared first on MediaCenter Panda Security.

How does Fusion protect Government bodies? – Case Study

cloud based solution

We have many times talked about Fusion as a solution which protects, manages and offers remote support to all the IT infrastructure in your organization.

But what if we talked about public institutions or Governments? Here you have two Case Studies about how Fusion worked in these types of organizations in Bjuy and Mullsjö, Sweden.

This is how Fusion protects Government Bodies – Case Studies

Municipality of Bjuv (Suecia)
Download

Mullsjö municipality (Sweden)
Download

The post How does Fusion protect Government bodies? – Case Study appeared first on MediaCenter Panda Security.

Panda Antivirus 2015 latest update: all about our three great innovations

panda simplexity change

If you are reading this after being informed by your computer that your product has been automatically updated, probably by now you have realized we have a new look&feel.

The panda bear located next to your PC’s clock which has always looked after your security while you enjoyed your online freedom has changed its looks to better represent our new corporate identity. Now we are Simplexity!

This new version 15.1, of consumer products, integrates some other important improvements like:

  • Improvement of our XMT engine, it has now greater protection capacity against new threats. To prove this we just have to look at the latest results obtained in the last Real World Protection Test carried out by AV-Comparatives, in which this new version detected 99, 8% of the threats, that’s an excellent result!

panda avcomparatives

  • Product performance maximization, integrating file copies and network analysis optimizations.
  • The possibility of launching the virtual keyboard from the new icon’s menu and Parental Control predefined profiles (available in Panda Internet Security and higher), are some of the improvements included in our paid products.

As you can see, we keep adapting and improving our services after receiving our users’ community feedback.

You are the reason we keep working to improve our security solutions in all devices! In the next few weeks we will announce new features… Stay tuned!

The post Panda Antivirus 2015 latest update: all about our three great innovations appeared first on MediaCenter Panda Security.

How to ensure your company’s email with Email Protection

Did you know that…

  • … 95% of the email received in the companies is either infected or spam?
  • … insufficient email security means loss of productivity, server failure, saturated networks and decrease of the business activity?
  •  … EP minimizes the resources consumed and requires no infrastructure?
  • … offers an immediate protection against virus and spam?
  • … is very easy to deploy and to use?

Try Email Protection, our Email Security Software, and forget the problems!

The post How to ensure your company’s email with Email Protection appeared first on MediaCenter Panda Security.

New version of Endpoint Protection, our leading antivirus for corporate environments

antivirus for business

Panda Security presents its light, simple and cross-platform security solution for endpoints.

Endpoint Protection, our corporate antivirus, offers continuous and centralized protection for your Windows, Mac and Linux systems, including laptops, servers, leading virtualization systems and Android devices.

“With Panda Enpoint Protection 7.20 we continue to strengthen our cross-platform security solutions by securing one of companies’ weakest and most vulnerable points: mobile devices,” explained Eduardo Fernández, Product Marketing Manager at Panda.

And if you need an additional layer of  protection, try Endpoint Protection Plus, which includes protection for Exchange servers, anti-spam, Web monitoring and filtering, and anti-theft features for mobile devices.

anti-theft protection

Cross-platform protection

As forecast by our colleagues at PandaLabs at the beginning of the year, in 2015 attacks on smartphones, and especially those running Android, are set to reach new levels. Not only will they increase, they will also become more complex, and they will all have a common target: to steal users’ personal data.

This is particularly serious in the case of company smartphones and tablets, and cyber-criminals will do anything to get hold of this information.

If 2014 saw more Android malware  in circulation that ever before, all indications are that in 2015 these threats will grow exponentially, as will the number of victims.

In this context, it will be essential for users to have antivirus protection on mobile devices. “Our ultimate goal is to help customers seal off this major malware entry point,” added Fernández.

Endpoint Protection: Benefits

  • Easy-to-use protection for all devices
  • Remediation actions
  • Real-time monitoring and reports
  • Profile-based configuration
  • Centralized device control
  • Quick, simple installation
  • Malware Freezer to “freeze” detected malware for seven days, and restore files in the event of a false positive.

Additionally, Endpoint Protection Plus includes:

  • Anti-spam and Web filtering
  • Anti-theft protection for mobile devices

If you are interested in trying our solutions, request a free demo of:

ENDPOINT PROTECTION
ENDPOINT PROTECTION PLUS

 

The post New version of Endpoint Protection, our leading antivirus for corporate environments appeared first on MediaCenter Panda Security.

How to solve your problems with your computer or smartphone

premium assistance

Do you have a virus in your computer and don’t know how to remove it? Don’t know how to set your Wi-Fi connection? You have a new smartphone and need to set it up?

Don’t worry! Ask for our remote assistance and enjoy a hassle-free digital life.

We have three different plans for you to choose from. Which meets you needs:

Fix&Protect Plan

Keep your computer virus-free.

  • Basic TuneUp/Optimization of Windows on 1 computer.
  • Disinfection of viruses and spyware.
  • Resolving any technical or IT security queries.
  • Installation and configuration of Panda Antivirus PRO (3 months of service).

Family Plan

Configure your home Wi-Fi network, as well as your PC, Mac or smartphone.

  • All options included in the Fix&Protect Plan.
  • Technical assistance for up to 5 devices.
  • Setting up your home Wi-Fi connection.
  • Setting up privacy settings on social networks.
  • Setting up your smartphone or tablet.
  • TuneUp/Optimization of your PC, Mac or smartphone.
  • Installation and configuration of Global Protectio on 5 devices (3 months service).

Complete Plan

A security expert will assist you anytime, anywhere.

  • All the options included in the Digital Home Plan.
  • Technical assistance for up to 10 devices.
  • Configuration of security on Web browsers and email accounts.
  • Troubleshooting of problems on your operating system or any other app or software.
  • Assistance with peripherals such as printers, cameras, scanners, etc.
  • Installation and setup of Global Protection on up to 10 devices (3 months service).

Try our remote assistance and forget about your problems. Call us free of charge and we will inform you about how it works!

The post How to solve your problems with your computer or smartphone appeared first on MediaCenter Panda Security.

The Future Of Internet Dating – Infographic

the future of internet dating r5

The Future Of Internet Dating

The year is 2031. Internet dating is to thank (or blame) for a projected 50% of relationships globally.

Smart phones and tablets replaced quills and love-letters long ago. Things move fast.

The world is a jungle of off-the-shelf love, mixed intentions, tactical selfies and clinical alliances.

Vicious creatures wait to ambush you – technologically and romantically – on your way through the online dating undergrowth.

Who can you trust? Where will you be safe? How can you attempt to build your survival hut and thrive in these wild times?

You have delicate information that needs to be kept safe, protected, discreet and available only to those you choose. Those happy few.

Turn to the king of this new-age jungle.

Panda Security. Stay Protected

If you want to share this infographic, here it’s the code!

The post The Future Of Internet Dating – Infographic appeared first on MediaCenter Panda Security.