Tag Archives: Panda Security

What is Cloud Computing and how it will boost your business – Infographic

What is Cloud Computing

Cloud Computing means storing and accessing data and programs in ‘the cloud’. This concept has been the basis of an entire business model that provides services and computing resources over the Internet.

This technology leverages the cloud to free users from having to worry about processing and storage work. Everything is done from and in the cloud.

Cloud Computing technologies don’t require any type of specific infrastructure from the user and provide cross-platform access at any time from anywhere.

Cloud-based security is an absolute necessity. Therefore, if you are looking for a business antivirus that provides best-of-breed cloud-based protection, look no further. Try Endpoint Protection.

Endpoint Protection provides cloud-based cross-platform protection for all your endpoints, minimizing maintenance costs and resource usage.

what is cloud computing

5 Reasons why Cloud Computing will boost your business

  1. Save costs.
    a. No need to buy any specific hardware since everything is in the Cloud (is Cloud based), which will drastically reduce the infrastructure costs.
    b. No need maintenance experts since the Cloud based solutions management is maintained by its creators from the cloud.
  2. Optimize resources.
    a. Increase the productivity of your IT department, since they will only have to focus on your problems, not on tools configuration, since the Cloud technology configuration and maintenance is as easy to use as your email.
    b. Increase the productivity of your workers offering them 360 access.
    c. Achieve more efficient and dynamic environments.
  3. Complete mobility.
    a. Access anytime, anywhere.
    b. Total access to the applications and the information.
    c. Access from any device connected to the Internet.
  4. Increase security.
    a. No need to make efforts in order to protect your Cloud based solutions, security is on us.
    b. The security technology you had ever imagined for your business safeguards your data.
    c. In case of disaster the Backup services in the cloud will save your business. You will be able to recover your data anytime.
  5. Growth and expansion flexibility.
    a. Want more licenses, here you go! Want more capacity, here you are! Want to expand your services, done! Everything you want, just by extending your Cloud services.

If you want to share this infographic, here toy have the code:

The post What is Cloud Computing and how it will boost your business – Infographic appeared first on MediaCenter Panda Security.

Information regarding an issue with the signature file in Panda Cloud Office Protection and Retail 2015

We inform you that we have had an incident with our signature file that might have affected our Panda Cloud Office Protection and Retail 2015 customers. This issue causes some files to be moved to the quarantine.

The signature file has already been replaced, so this situation should not recur. Nonetheless, we advise our customers not to restart your computer. At Panda Security we are working to restore the situation at the endpoint as soon as possible.

We apologize for any inconvenience this may have caused you. We will keep you informed at all times.

*** UPDATE – Wednesday, 21:20 (CET)

The solution which restores the quarantined files has been automatically deployed in all the affected products. We are working on a tool to be installed on those computers which require a manual installation of the solution. We will update the information as soon as it is ready.

http://www.pandasecurity.com/uk/homeusers/support/card?id=100045

The post Information regarding an issue with the signature file in Panda Cloud Office Protection and Retail 2015 appeared first on MediaCenter Panda Security.

Panda Security: 25 years fighting against malware – Infographic

Already 25 years together? It seems like yesterday when a group of friends in Bilbao started this adventure! Who would have thought that, 25 years later, we would be present in over 80 countries and competing with the big boys. Constantly reinviting ourselfs and always learning! We are nonconformists, and that’s what makes us constanly innovate our products, addapting as the World changes, faster and faster every minute. Since the pre-internet era, when viruses were transmited by disketts, to the present, the Internet of Things era, when we are surrounded by a multitude of always-connected devices. Panda Security has been here protecting us!

Let’s go Panda! For another 25 years together!

panda security 25 years malware

Our technology

  • 1998. We lunch the 1st antivirus with a daily signature file.
  • 2004. We launch the 1st behavioral scan.
  • 2007. We develop the 1st Cloud scanning product.
  • 2009. We launch the 1st antivirus in history to protect from the Cloud.
  • 2010. We become the 1stsecurity company with a completely Cloud-based offering.
  • 2011. We launch a console for partners to manage their customers’ complete life-cycle & security.
  • 2012. We launch the 1st SaaS security solution for endpoints & Exchange servers.
  • 2013. We are the 1st developer to propose a disruptive security model based on Cloud Computing, Big Data and Behavioral Analysis.
  • 2014. We launch the 1st security service that ensures all running processes.

Malware Eras

  1. Entertainment Era: From 1971

Viruses were created for fun, some of them highly damaging and others harmless, but they were designed for nothing more than to entertain their creator. They spread slowly (months, or even years) as they were distributed via floppy disks.

  1. Macro Era: From 1996

The Internet became more popular and we started to see viruses that altered or neutralized the macros’ functions. These viruses spread through documents or were downloaded by clicking on a banner or file attached to an email.

  1. Helminthic Era: From the end of 1998

The Internet was becoming increasingly widespread, and the first email worms started to appear. Although the distribution of these worms was limited, the “I Love You” virus got to be sent to numerous email contacts, saturating the Internet.

  1. Automat Era: From 2003

The appearance of “Blaster” in 2003 heralded the emergence of network worms; this new kind of threat didn’t require user intervention to infect computers.

  1. Usurper Era: From 2004

As network and email worms infected millions of computers around the globe, we began to see the first examples of malware created by cyber-criminals for financial gain: banker Trojans. The first phishing attacks were carried out.

  1. Institutional Era: From 2007

In 2007 we saw the first massive cyber-attack on a country; Estonia was the victim of a massive attack that took down Web pages and services of the national parliament, banks, ministries, newspapers, etc. The attack originated in Russia.

One year later, before the Russian invasion of Georgia, a cyber-attack was launched that completely isolated the country from the Internet.

  1. Hacktivism Era: From 2010

Anonymous launched campaigns against different organizations. And large companies started to fall victim to attacks (in 2011 accounts were hacked and data was stolen from Sony PlayStation Network, RSA Security, etc.).

  1. Advanced Era: From 2013

Money or political interests motivate everything: widespread ransomware campaigns (CryptoLocker, TorrentLocker, CTB-Locker, etc.), highly sophisticated banker Trojans, attacks on large organizations, including point-of-sale terminals, APTs (Advanced Persistent Threats), etc.

Want to share this infographic? Here is the code!

The post Panda Security: 25 years fighting against malware – Infographic appeared first on MediaCenter Panda Security.

Cyber Resolutions You’Ve Already Broken

Cyber Resolutions you already broken

Cyber resolutions you’ve already broken

Resolution. I will not reuse passwords

Having different passwords for every website you use increases your safety. A password is only as dependable as the least secure site that has it. You might be attached to  ‘loverboy82’, but time to think of something more original.
Resolution. I will not use passwords a human could guess

It’s the age of social media, and we share a lot more than we think. If your password is a loved one’s name (even with threes instead of ‘e’s), the only thing stopping a hacker is a quick search on your Facebook page – or that of your partner, grandchildren, bowling partner…
Resolution. I will not use passwords a computer could guess

Computers understand word structure and are capable of guessing around one thousand variations a second, so using four random words without spaces, e.g. ‘houseboatchickencannon’, is far more effective, and memorable, than using a one-word password. Thinkofsomethingnowquick.

Resolution. I will not use passwords a monkey could guess

We’re calling time on ‘password’, ‘12345’ and ‘let me in’. The only difference between these passwords and none at all is that these come with the satisfaction of making a hacker waste two minutes of his time.
Resolution. I will not put off updating my anti-virus protection

Think of antivirus as your weapon against online fraud, viruses and worse. “Yeah!” shouts your digital anti-virus warrior. “I’m ready to protect your online safety, as soon as you give me a sword! Um… hello? Anyone?”
Resolution. I will install anti-virus protection on every device that needs it

Sure you already protected the main computer, but is that the only device in the house that you use to go online? Mobile devices and laptops have just as much access to your private information, and they need just as much protection.

Resolution. I will install a parental control on my anti-virus software

Sometimes it seems like kids know more than adults about getting around online, but they certainly don’t know more about staying safe. Parental control gives you the power to keep them that way, monitoring and controlling what they’re exposed to online.

Make your resolutions stay safe.

If you want to share this infographic, here you have the code:

The post Cyber Resolutions You’Ve Already Broken appeared first on MediaCenter Panda Security.

Panda Security improves its positon in the Visionaries Quadrant of Gartner Magic Quadrant

Panda Security, Cloud Security, announces that it has been included as a Visionary in the ‘Gartner Magic Quadrant for Endpoint Protection Platforms’, published on December 22, 2014. The company, which has been included in this quadrant for the seventh consecutive year, has improved its positioning.

The Gartner report evaluated all of the vendors in the endpoint protection platforms market based on their products, completeness of vision and ability to execute.

“We believe industry has assessed positively the new technologies incorporated by Panda Security in the fight against malware. We feel this emphasizes that Panda Security is the first vendor in the endpoint protection platforms market to offer a service that classifies all executables running on endpoints, which represents a significant innovation compared to the current products”, said Josu Franco, VP Corporate Development at Panda Security.

We feel this new evaluation strengthens the path taken years ago by Panda Security towards a strategy that is fully committed to offering cloud-based services and a new protection model.

A complimentary copy of the Gartner, Magic Quadrant for Endpoint Protection Platforms, Peter Firstbrook, John Girard, Neil MacDonald, December 22, 2014 is available here.

The post Panda Security improves its positon in the Visionaries Quadrant of Gartner Magic Quadrant appeared first on MediaCenter Panda Security.

Now we are simplexity!

Making complex things simple. That’s the meaning of simplexity, and the basis of the transformation Panda has undergone.

An internal and external transformation of the way we do things, and which signals the beginning of an ambitious five-year strategic plan based on growth, technology and international expansion.

This is the new Panda

panda logo

Our new corporate identity coincides with the company’s 25th anniversary and is the result of the participation of all Panda’s offices around the world.

The worldwide presentation of our new strategic plan took place yesterday in Madrid. This event, which was attended by numerous Panda employees as well as the media, gave us the opportunity to explain the company’s core values among many other things: non-conformist, people-centric and innovative.

Here are some pictures from the event!

panda security simplexity

 

diego navarrete panda security

Diego Navarrete, Panda Security CEO, during the event

 

Paula Quiros Panda Security

Paula Quirós, our CMO

 

Felipe Mejias Panda Security

#PandaSimplexity by Felipe Mejías

 

simplexity panda security

After almost a year of hard work we are finally proud to present to you the new Panda. What do you think? Will you join #PandaSimplexity?

The post Now we are simplexity! appeared first on MediaCenter Panda Security.

#XMASPANDA contest winners!

Christmas contest

We finally can communicate our #XMASPANDA contest winners.

If you are one of our Twitter winners, send us a Direct Message. Then if you are the one from Facebook , you can send us a Private Message too.

We need the following details:

  1. Name
  2. Address
  3. Mobile Phone
  4. Email Address

Panda Mobile Security License

  • Ramon Jarque Anton
  • Diana de Felipe Tenorio
  • Adrian Aguilera Quesada
  • Robert Mcdonald
  • Liz Schneider
  • Carol Foxx
  • Rob Diggle
  • Aleksey Apasov
  • Tomas Domingo Catalan
  • Francisco Dominguez Moreno
  • @javiermargarit
  • @nabil_freedom
  • @markes5d
  • @glenhilts
  • @p_sandhal
  • @_utdfan
  • @mnvikes40
  • @cathleen_ming
  • @avenue25
  • @hilbournetony

Panda Security Cup

  • Jesús Montes
  • Oscar Luis Maiso Pavia
  • David Escobar
  • Gayle L Johnson
  • Paulo Bispo
  • Iñaky Aion
  • Conceiçäo Carvalho
  • Victor Jiménez Rodríguez
  • Jamie RollerGirl Garland
  • Lisa Middleton
  • Joey Harden
  • @mariasedeo1
  • @travellermind1
  • @tannis91
  • @novairt
  • @ilorcisoft
  • @fabin_ferreira
  • @fer_cantillo
  • @iwantyourstuff
  • @dlrcorn

Panda Security Headphones

  • Ele Velasco Sastre
  • Carlos Martinez Rivero
  • Tina Loucks
  • Christine Gordon
  • Brad Belden
  • @carlosdefuentes
  • @elgrangeniofamy
  • @ybarralde
  • @aprilhaddock
  • @gasteiztarrabat

Thanks for taking part of our Christmas contest! :)

The post #XMASPANDA contest winners! appeared first on MediaCenter Panda Security.

Christmas contest! – Help us to get a safe Christmas!

Christmas contest

As you have no doubt seen, these days we have been posting a series of articles to help ensure everyone enjoys a safe and happy Christmas! We want to help you to be able to shop online without any unpleasant surprises, and avoid falling for any of the typical Christmas scams that are doing the rounds at this time of year.

That’s why we have organized this competition, in order to reward you for helping our content to reach across the globe.

What can you win? Well, we’ve spoken to Santa and he’s going to leave various presents under the Panda Christmas tree. On December 23 and 29 and on January 2, we will reveal the prizes on offer each week to those who share our content.

How can you take part? It’s easy! Share on Facebook or RT on Twitter all the content we post with hashtag #xmaspanda. Prizes will be drawn among those who do this on the days included in the competition.

We will announce the winners on January 12 in this blog. So keep your eyes open!

Remember, Share or RT the posts with #xmaspanda and you could win great prizes.

The post Christmas contest! – Help us to get a safe Christmas! appeared first on MediaCenter Panda Security.

Panda Security launches Panda Cloud Office Protection 7.1

Panda Security, The Cloud Security Company, announces the new features of version 7.1 of Panda Cloud Office Protection (PCOP), Panda Security’s cross-platform solution that offers the best cloud-based protection rapidly, easily and efficiently. In addition to the features included in the previous version, such as the ability for the user to act independently in the event of infections or problems detected, this version also includes improvements aimed at meeting the requirements of medium-sized and large customers who need greater control.

 Panda Cloud Office Protection 7.1 incorporates various technological and functional innovations compared to the previous version of the solution, with special emphasis on giving the user greater control and management. These new features include:

  • Content filtering for the Exchange protection, which allows emails to be filtered by the extension of the attachment, neutralizing dangerous attachments or attachments with a multiple file extension.
  • Whitelists included in device control. This feature allows different exclusions to be applied to different groups of computers selected by profile. In addition, whitelisted devices can be used without any restrictions, regardless of the settings.
  • Mobile device control. This option allows the user to block access to mobile devices.
  • New local console on the endpoint. This console provides PCOP administrators and partners with a tool to enable or disable the endpoint protection in a rapid and timely manner, without having to use the PCOP Web console.
  • Ability to upgrade to new versions from the PCOP Web console. Notifications will appear in the console to indicate that a new version is available.

PCOP 7.1_EN

 

“With Panda Cloud Office Protection 7.1 we want to foster independence of the network administrator, easing management of the solution, including whitelists and offering reports that help give the user greater control”, says Roberto Fernandez, Product Manager at Panda Security. “The goal of this new version is to offer PCOP administrators and our partners a tool that allows them to quickly secure their corporate environments,” he concludes.

The post Panda Security launches Panda Cloud Office Protection 7.1 appeared first on MediaCenter Panda Security.

Malware figures beat records with more than 20 million new samples identified in the third quarter of the year

Panda Security, The Cloud Security Company, has released the latest data from the PandaLabs Quarterly Report for the third quarter of the year. The main conclusions of the study include an increase in the malware created compared to the previous quarter, with a total of 20 million new samples created worldwide, and at an average rate of 227,747 new samples every day.

The global infection rate was 37.93%, compared to 36.87% the previous quarter.

Trojans are increasing

Trojans are still the most common malware type (78.08%), increasing compared to the second quarter of the year. In second place, and a long way behind, are viruses (8.89%) and worms (3.92%).

“Over recent months cyber-crime has continued growing. Cyber-crooks are still creating malware in order to infect as many computers as possible and access confidential data”, says Luis Corrons, Technical Director of PandaLabs at Panda Security. “But corporate environments have also come under attack. For example, over the last three months large companies have been the subjects of some scandals, such as the infamous “Celebgate”, in which photos of actresses and models hosted on Apple’s iCloud service were leaked, or the theft of Gmail and Dropbox passwords”.

Trojan infections are up while PUPs are dow

Furthermore, Trojans were again the most malware prolific threat during the period, accounting for 75% of infections, compared to 62.80% in the previous quarter. PUPs are still second in the ranking, representing 14.55% of the total, which is a lower rate than in the second quarter when infections that used this technique amounted to 24.77%. These are followed by adware/spyware (6.88%), worms (2.09%) and viruses (1.48%).

01_ENInfections by country

The data recorded for each country shows that China is still at the top, reaching an infection rate of 49.83%, falling for the first time in a long time from 50% of computers infected. China is followed by Peru (42.38%) and Bolivia (42.12%).

 

As you can see the ranking of countries with the highest infection rate is dominated by Asia and Latin America.

The full report is available here.

The post Malware figures beat records with more than 20 million new samples identified in the third quarter of the year appeared first on MediaCenter Panda Security.