Founded in 1990, Panda Security is the world’s leading provider of cloud-based security solutions, with products available in more than 23 languages and millions of users located in 195 countries around the World. Panda Security was the first IT security company to harness the power of cloud computing with its Collective Intelligence technology. This innovative security model can automatically analyze and classify thousands of new malware samples every day, guaranteeing corporate customers and home users the most effective protection against Internet threats with minimum impact on system performance. Panda Security has 80 offices throughout the globe with US headquarters in Florida and European headquarters in Spain.
Panda Securityn Pohjoismaiden toiminnot hoitaa Panda Security Sweden AB, ja Suomen toimistomme sijaitsee Tampereella osoitteessa Haarlankatu 1 F.
Panda Security on perustettu vuonna 1990, ja alusta asti olemme valmistaneet antivirustuotteita sekä yrityksille että kuluttajille. Tuotevalikoimamme on sittemmin laajentunut muun muassa palomuuri- ja sovellusanalyysiratkaisuihin sekä softatyökaluihin.
Suomen myyntiorganisaatio keskittyy ensisijaisesti yritystuotteisiin, ja esittelemme tuotteita webinaareilla. Tuotteista on saatavissa kokeiluversiot, ja opastamme tuotteiden käyttöön suomeksi ja englanniksi.
MANAGE YOUR IT INFRASTRUCTURE SIMPLY AND PROACTIVELY WITH A RAPIDLY INTEGRATED SOLUTION
Systems Management is the easy and affordable way to manage, monitor and maintain all your organization’s devices, whether they are
in the office or remote. Thanks to the simplicity offered by the pre-configured settings, the learning curve is practically non-existent, and
it ensures that the organization’s IT infrastructure operates exactly according to plan.
Why opt for System Management?
It frees up your IT team to concentrate on value-added projects
It resolves problems proactively
It enhances support for new technologies and encourages adoption of BYOD
FEATURES
100% cloud-based solution: No additional infrastructure. Manage all devices at any time and from anywhere.
Secure access to the service: Twofactor authentication to verify identities. Encrypted communication with the server.
Manage devices using an ultra-light agent for Windows, Linux, Mac OS X, Android and iOS, and via SNMP with no agent for printers and other network devices.
Alerts and monitoring: Monitor use of CPU, memory and hard disks, printers low on ink etc., with real-time graphs and alerts.
Rapid tasks and scripts: Create your own scripts or download them from our ComStore. You can also modify them to suit your needs and launch them.
Patch management: Automate the deployment of updates and patches for the software installed.
Software deployment: Centrally deploy software and updates.
Remote access: Task management, file transfer, registry editor, command line, event log, etc. Repair devices without interrupting users, even if they are switched off. Access to user’s desktops – either shared or with complete control.
Tickets system: Organize, classify and prioritize incident resolution. Share and reuse technical procedures for resolving problems.
Manage smartphones and tablets (MDM): Establish password policies, control over use of the device, remote connectivity settings, remote locking and data wiping.
Security certificates: FISMA, SAS70, ISO 27001 and PCI DSS.
TAKE CONTROL OF IT: ASSET MANAGEMENT
Control your devices:
100% granular visibility of the devices you manage
Stay up-to-date on your IT environment and changes
Keep a check on the hardware and software installed and in use
STOP FIRE-FIGHTING AND REDUCE YOUR IT COSTS
Cut out repetitive tasks and phone calls; be proactive:
The real-time alerts let you identify printers low on toner, servers
with little disk space and many other problem indicators
Automate repetitive tasks
The events logs display information for each device
Patch management to keep all devices up-to-date
KEEP IT CENTRALIZED AND SIMPLE
Manage your IT resources from a single Web console with all
the information and tools you need:
Cloud-hosted; with no additional infrastructure
Manage all your devices no matter where they
are at any time and from anywhere
Almost non-existent learning curve
OFFER USERS THE BEST SUPPORT EXPERIENCE, NO MATTER WHERE THEY ARE
Drastically reduce calls to support:
Monitor and deliver remote support to all devices, even if they are
switched off
Use diagnostics and non-intrusive problem resolution to increase
productivity
Evaluate productivity:
See who’s done what at what time and with what device, etc
It lets you see reductions in downtime and
support time
Identify problematic hardware/software
DON’T LOSE SIGHT OF YOUR SMARTPHONES AND TABLETS
A single tool lets you monitor and manage all your mobile
devices:
Locate stolen devices and prevent loss of data when devices are lost or
stolen with password protection and remote data wiping
Improve device security by setting standards for the passwords chosen by
users. (*)
Block non-productive features (installation of games and apps, use of
cameras, movies, etc.) (*).
Centrally configure VPN and Wi-Fi settings for all devices. (*)
(*) Available for iOS platforms
TECHNICAL REQUIREMENTS
For workstations / file servers
Operating systems (workstations): Windows 2000 Professional,
Windows XP SP0 & SP1 (32 and 64-bits) XP SP2 and later, Vista,
Windows 7, Windows 8.1 (32 and 64 bits) and Windows 10 (32 and
64 bits).
Operating systems (servers): Windows 2000 Server, Windows
Home Server, Windows 2003 (32, 64 bits and R2) SP1 and greater,
Windows 2008 32 and 64 bits, Windows 2008 R2 (64 bits),
Windows Small Business Server 2011, Windows Server 2012 (64 bit
and R2).
(*) Windows Installer 3.1 and .Net Framework 2.0 required.