REINVENTING CYBERSECURITY.

Similar documents
The European Company that protects the world

Panda Security. Corporate Presentation. Gianluca Busco Arré Country Manager

PROTECTION FOR WORKSTATIONS, SERVERS, AND TERMINAL DEVICES ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

Put an end to cyberthreats

ENDPOINT SECURITY STORMSHIELD PROTECTION FOR WORKSTATIONS. Protection for workstations, servers, and terminal devices

Real-time, Unified Endpoint Protection

Kaspersky Cloud Security for Hybrid Cloud. Diego Magni Presales Manager Kaspersky Lab Italia

Services solutions for Managed Service Providers (MSPs)

BUILT TO STOP BREACHES. Cloud-Delivered Endpoint Protection

Get Armoured Against Endpoint Attacks. Singtel Business. Managed Defense Endpoint Services Threat Detection and Response (ETDR)

EU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux

A Data-Centric Approach to Endpoint Security

Altitude Software. Data Protection Heading 2018

with Advanced Protection

SOLUTION OVERVIEW. Enterprise-grade security management solution providing visibility, management and reporting across all OSes.

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Introduce the major evaluation criteria. TCSEC (Orange book) ITSEC Common Criteria

Introduce the major evaluation criteria. TCSEC (Orange book) ITSEC Common Criteria

deep (i) the most advanced solution for managed security services

Securing Your Most Sensitive Data

SOLUTION BRIEF RSA NETWITNESS NETWORK VISIBILITY-DRIVEN THREAT DEFENSE

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments

CYBER SECURITY. formerly Wick Hill DOCUMENT* PRESENTED BY I nuvias.com/cybersecurity I

Social Engineering: We are the target Sponsor Guide

STRATEGY PEACE OF MIND AS A SERVICE Samu Konttinen, CEO

Samu Konttinen, CEO, F-Secure WE ARE F-SECURE. 1 F-Secure

IT Security Evaluation : Common Criteria

Supply Chain Integrity and Security Assurance for ICT. Mats Nilsson

Bromium: Virtualization-Based Security

Traditional Security Solutions Have Reached Their Limit

Roberto NARETTO Technical Director CTO

Tomorrow s Endpoint Protection Platforms Emergence and evolution

Global Manufacturer MAUSER Realizes Dream of Interconnected, Adaptive Security a Reality

TOMORROW S SECURITY, DELIVERED TODAY. Protection Service for Business

WHITEPAPER ENDPOINT DETECTION AND RESPONSE BEYOND ANTIVIRUS PROACTIVE THREAT HUNTING AT THE ENDPOINT

AT&T Endpoint Security

A STRONG QUARTER FOR CORPORATE AND CONSUMER SECURITY. Samu Konttinen, CEO Interim Results Q1 2017

Converged security. Gerben Verstraete, CTO, HP Software Services Colin Henderson, Managing Principal, Enterprise Security Products

Building Resilience in a Digital Enterprise

ENTERPRISE ENDPOINT PROTECTION BUYER S GUIDE

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

The Business of Malware IT Security Presentation

Managed Security Services - Endpoint Managed Security on Cloud

Verizon Software Defined Perimeter (SDP).

Partner Program Overview PARTNER PROGRAM

Reinvent Your 2013 Security Management Strategy

Symantec Endpoint Protection 14

locuz.com SOC Services

Reducing the Cost of Incident Response

Commercial Product Matrix

Symantec & Blue Coat Technical Update Webinar 29. Juni 2017

Designing an Adaptive Defense Security Architecture. George Chiorescu FireEye

Symantec Protection Suite Add-On for Hosted Security

Securing the SMB Cloud Generation

FOR FINANCIAL SERVICES ORGANIZATIONS

A Simple Guide to Understanding EDR

BUILDING AND MAINTAINING SOC

Symantec Endpoint Protection

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

Symantec Advanced Threat Protection: Endpoint

The SIEM That Gives SIEM a Good Name. Avi Chesla Founder & CTO

Free Download BitDefender Client Security 1 Year 50 PCs softwares download ]

THE LIFE AND TIMES OF CYBERSECURITY PROFESSIONALS

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

McAfee Network Security Platform

RSA Advanced Security Operations Richard Nichols, Director EMEA. Copyright 2015 EMC Corporation. All rights reserved. 1

IT & DATA SECURITY BREACH PREVENTION

Pedal to the Metal: Mitigating New Threats Faster with Rapid Intel and Automation

RSA ADVANCED SOC SERVICES

FTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved.

SentinelOne Technical Brief

MCAFEE INTEGRATED THREAT DEFENSE SOLUTION

Ransomware piercing the anti-virus bubble

Proofpoint, Inc.

Threat-Agnostic Defense tm is the New Security Paradigm

Managed Endpoint Defense

ERCI cybersecurity seminar Guildford ERCI cybersecurity seminar Guildford

Endpoint Security Transformed. Isolation: A Revolutionary New Approach

VIETNAM CYBER-SAVVINESS REPORT 2015 CYBERSECURITY: USER KNOWLEDGE, BEHAVIOUR AND ATTITUDES IN VIETNAM

Why Are We Still Being Breached?

Designing and Building a Cybersecurity Program

2017 ANALYST DAY. Influencer A SLEEK AND professional template for smart presenters

JAPAN CYBER-SAVVINESS REPORT 2016 CYBERSECURITY: USER KNOWLEDGE, BEHAVIOUR AND ATTITUDES IN JAPAN

Incorporating Hunt Teams To Defend Your Enterprise

Samu Konttinen, CEO Q3 / 2017 CORPORATE SECURITY REVENUE UP BY 11% - GOOD GROWTH CONTINUED

PRODUCT OVERVIEW. On-demand threat investigation, root cause analysis and remediation advice without the need for extra internal resources

converged agile practical Design Your Security We build tailored, converged security for you.

CROWDSTRIKE FALCON FOR THE PUBLIC SECTOR

COMPANY VISION 기업의생산성향상에기여하는최고의협업솔루션을제공하는최고의클라우드기업솔루션공급사

E-guide CISSP Prep: 4 Steps to Achieve Your Certification

Advanced Endpoint Protection

Get BitDefender Client Security 2 Years 30 PCs software suite ]

OPPORTUNITY TO ACCELERATE MOMENTUM

RSA INCIDENT RESPONSE SERVICES

May the (IBM) X-Force Be With You

99% Recorded Books. Session duration increased by. Distinction. ENTERTAINMENT AUDIOBOOKS

Notification of Issuance of Binding Operational Directive and Establishment of. AGENCY: National Protection and Programs Directorate, DHS.

Protect Your Endpoint, Keep Your Business Safe. White Paper. Exosphere, Inc. getexosphere.com

Security. Protect your business from security threats with Pearl Technology. The Connection That Matters Most

WatchGuard Total Security Complete network protection in a single, easy-to-deploy solution.

Transcription:

REINVENTING CYBERSECURITY www.pandasecurity.com

28 Years of Innovation Over the course of its 28 years, Panda has marked some of the most important advances in the world of cybersecurity. 2018 Visionaries in EPP Gartner s Magic Quadrant 10% of market share in EDR 2016 The only European provider to be included in the Gartner Market Guide for EDR 2015 New security model (EPP+EDR) 2012 1998 First daily signature 2004 First behavior analysis 2007 First product to use cloud based scanning First security business with an entirely cloud-based product offering

NSS Labs 2018 Advanced Endpoint Protection (AEP) Group Test evaluated twenty market-leading AEP products on security effectiveness TCO. Panda Adaptive Defense 360 achieved the Recommended rating Panda Security participates in AV-Test for more than 10 years Panda Adaptive Defense 360 has been reviewed by PC Pro and ITPro, two of the UK s leading enterprise IT websites, where it has received 5 stars and the Editor s Choice award Panda Security achieved maximum levels of protection in the Real-World Protection Test in 2017, leading it to take home that year s Gold Award Panda Security achieves VB100 VIRUS certification with 100% of detection Panda Security keeps those maximum levels in 2018 in the Real-World Protection Tests and in the Performance Tests Panda Security reached the Approved level in Business Security Tests and Review Market recognition Panda Security regularly participates in and receives awards for protection and performance from Virus Bulletin, AV- Comparatives, AV-Test, NSSLabs.

Gartner Named Panda Security as a Visionary in 2018 Magic Quadrant for Endpoint Protection Platforms (EPP), as a recognition of its unique classification or attestation service of every single executable file and process and its managed threat hunting service, included in the base purchase of Panda Adaptive Defense 360 Market recognition The external analysts and testers can all vouch for the shift from the traditional security model to contextual intelligence.

Panda Adaptive Defense is the only EDR solution to achieve the EAL2+ certification in its evaluation for the Common Criteria standard. The Common Criteria for Information Technology Security Evaluation (CC) is a set of evaluation criteria agreed to by the United States National Security Agency/ National Institute of Standards and Technologies and equivalent bodies in 27 other countries. The Common Criteria for Information Technology Security Evaluation (CC), and the companion Common Methodology for Information Technology Security Evaluation (CEM) are the technical basis for an international agreement, the Common Criteria Recognition Arrangement (CCRA), which is a set of evaluation criteria agreed to by the following countries according to their National Security Agencies/ National Institutes of Standards and Technologies and equivalent bodies in 28 countries. Market recognition Panda Adaptive Defense is the only EDR solution to achieve the EAL2+ certification in its evaluation for the Common Criteria standard.

Customers testimonials Cases Studies Companies of all sizes and segments trust us Their organizations are more resilient to today s cyber-attacks. They are protected, save time and effort, and gain total endpoint visibility. Check their success stories in the following case studies. Anticipation is our best ally when defining our future needs and preventing risks. Adaptive Defense 360 gives us the visibility needed to achieve that anticipation. Jean-Yves Andreoletti Systems and Network Integration, Validation and Maintenance Platforms Engineer Panda Adaptive Defense 360 proactive approach to fighting against malicious software gives me peace of mind. It s easy to configure, manage, and remediates issues quickly through its simple to use web interface. Jeff Smith Technology Systems Administrator at SHS Chicago We greatly appreciate Panda Security s channel strategy and portfolio. With their console we can manage our entire client base from a single point, something no other vendor is able to provide. Nathan Mills Managing Director

Customers testimonials USA North America Industry: Education 300 licenses Industry: Retail 500M - 1B USD Industry: Services < 50M USD Panda Adaptive Defense 360 proactive approach to fighting against malicious software gives me peace of mind. It s easy to configure, manage, and remediate issues quickly through its simple to use web interface. The speed of response of the equipment and the ease of use makes that the end users do not need any type of stop or update the components are simple and fast they do not generate effort in the performance of equipment and servers strong, fast, speed is the quilty. Overall A Great Product/Service. Someone has always been available in any situation from the beginning of the sale right through to each new client we have installed the product with.

Global Presence Overall Size World Wide Market Share 2% in EPP Product 10% in EDR 10% North America 80% Europe 10% Rest of the world Business Lines 78% Corporate 10% Consumer Distribution in +180 countries Oficces have 36 franchises We have 16 subsidiaries We speak 23 languages