SlideShare a Scribd company logo
Panda Managed Office Protection Switch from Antivirus to Security as a Service Technical  presentation
Security Concerns What is Panda Managed Office Protection? How Does it Work? Competitive Analysis How to Sell Sales Policy Business Opportunity for Partners Frequently Asked Questions Sales Kit Table of Contents
Security  Concerns Panda Managed Office Protection
Security Concerns TIME:  Traditional antivirus require too much time and effort from SMBs COSTS:  Additional hardware and software infrastructure needed. Tight IT budget COMPLEXITY:  Complicated management requires dedicated and skilled personnel not focused on core business
Complexity and cost in managing desktop antivirus Security Concerns Database Admin servers Console Admins Web server Repository servers Management infrastructure
Security Concerns Lack of security-skilled resources Tight IT budget 24x7 monitoring to reduce risk Small and Medium Business Manage geographically distributed offices 24x7 monitoring to reduce risk Low bandwidth consumption  Remote Office  Branch Office  No budget for security management No one in charge of security management Home Office Target Market Security Management Concerns
What is Panda Managed Office Protection? Panda Managed Office Protection
What is Panda Managed Office Protection? Infrastructure  at  customer site Management  &  Monitoring  by  own personnel Traditional  Model Infrastructure hosted at vendor Management  and  Monitoring  by  MSSP SaaS & MSSP Model Infrastructure hosted at vendor Management  &  Monitoring  by  own personnel SaaS Model
Panda Managed Office Protection is a web-based subscription service that removes the cost and management overheads of hardware, personnel and other resources  dedicated to antivirus for SMBs What is Panda Managed Office Protection? Subscribe to Security as a Service for your organization .
What is Panda Managed Office Protection? Complete protection for SMBs and remote offices   Antimalware Firewall HIPS Proactive Protection In-depth Malware   Audit Web Console Internet
Unmatched Security Data Processing Daily Intelligence at  Panda Research 4 MILLION  PCs Monitored  9 MILLION Unique Samples Processed 96 MILLION  Processes Monitored 340 MILLION  Malware Correlations Dedicated Research & Development team at PandaLabs monitors  thousands  of malware sites gathering  8 Terabytes  of information 94.4% of all malware detected in 2007 was managed by Collective Intelligence automatically “ It is a matter of survival for AV vendors, who increasingly are looking for ways to reinvent themselves as their product struggle to thwart new type of infections.  Cloud-based, collective intelligence services are the next big thing for anti-malware .  I expect that every AV vendor will need to embrace an approach like this if they expect to survive”  Yankee Group Collective Intelligence
Minimizes Operating Costs  Eliminates Complexity Reduces Productivity Loss Improves Risk Management Ensures Business Continuity Prevents Identity Theft  Helps Enforce Regulatory Compliance Benefits for Clients
How Does it Work? Panda Managed Office Protection
How Does it Work? Customer 1 Office 1 Office 2 Administrator Panda Managed  Office Protection GNOC Customer 2 Mobile users Administrator Office 2 Install option 1 . Users receive e-mail with link and click to install protection Updates/ upgrades from nearest desktops. Minimizes  bandwidth consumption Install option 2 . Push install via distribution tool
Panda Managed Office Protection Features and Functionalities
Features Proactive Protection against Unknown Malware Files, Email, Internet Browsing and Instant Messaging Protection Managed Personal Firewall and HIPS In-depth Malware Audits Web Administration Console
Features Web Administration Console (Status) License status and detection activity by type of malware and by source
Features Web Administration Console Direct acces to Malware Radar in order to perform in-depth audits
Features Web Administration Console (Monitoring)
Features Web Administration Console (Protection)
Features Web Administration Console (Install Protection) Application of installation package manually or through external distribution systems
Features Web Administration Console (Install Protection) Installation through e-mail
Features Web Administration Console (Install Protection) Download installation tool in order to push installation with no user intervention
Features Web Administration Console (Install Protection) Installation can be pushed romotely to selected stations with no user intervention
Features Web Administration Console (Profile)
Features Web Administration Console (Profile) For modifying update rules of protected stations
Features Web Administration Console (Profile)
Features Web Administration Console (Profile)
Features Web Administration Console (Profile)
Features Web Administration Console (Firewall) Centrallized or locally managed firewall
Features Web Administration Console (Firewall)
Features Web Administration Console (Firewall)
Features Web Administration Console
Features Web Administration Console (Firewall)
Features Web Administration Console (Groups) Assign security profiles by groups Check existing  security profiles
Features Web Administration Console
Features Web Administration Console
Features Web Administration Console
Features Web Administration Console
Features Web Administration Console
Functionalities P2P Updates / Upgrades Profile Based Protection Delegated Administration Management Flexible Installation Daily Status Reports in your e-mail  Automatic and on-demand Upgrades / Updates
Uninstallers available * Coming soon Norton Internet Security (Home, Home/Office, Enterprise and SMB Edition) Symantec EndPoint Protection 11 Symantec Antivirus 10.3 (all editions) Symantec Antivirus 10.1 (all editions) Trend Micro Client Server Security for SMB  Trend Micro (PC-cillin) Internet Security 2008* Panda WebAdmin (all versions) Panda Antivirus 2008 Panda Antivirus + Firewall 2008 Panda Internet Security 2008 Panda for Desktops 4.x Panda for File Servers 4.x Avast* AVG* McAfee VirusScan Enterprise 8.5i McAfee VirusScan Enterprise 8.0i McAfee Internet Security Suite 2007 McAfee Total Protection 2008 F-Secure Protection Service for Business F-Secure Antivirus 5.52 Antivirus 2004 (Home Edition) F-Secure Antivirus Client Security 7.X Kaspersky Work Space Security Kaspersky Business Space Security Kaspersky Anti-Virus 7.0 Microsoft Live OneCare Sophos Anti-virus SBE 2.5 Sophos Security Suite Antivirus Automatically Uninstalled by Panda
Competitive Analysis Panda Managed Office Protection
Competitive Analysis Local console for end user   Panda Security McAfee F-Secure Trend Micro Personal and managed firewall (HIPS) Behavioral proactive heuristic detection E-mail protection Internet browsing protection Delegated Administration management P2P upgrades and updates On-demand local update On-demand remote upgrades by group Malware Audit Service McAfee’s main weakness:  lacks some  basic protections such as static behavioral analysis or e-mail protection   Panda’s advantage:   offers proactive detection and all necessary protections for securing small business F-Secure’s main weakness:  lacks functionalities for end user management  such as local console or on-demand local updates Panda’s advantage:   offers more complete protection and options for local management Trend Micro’s main weakness : needs installation “in-house” in order to manage protections remotely Panda’s advantage:  can be deployed  and managed remotely
Frequently Asked Questions Panda Managed Office Protection
Frequently Asked Questions How can Panda Managed Office Protection help SMBs be protected? Panda Managed Office Protection is a solution for small and medium business that removes the cost and management overheads of hardware, personnel and other resources  dedicated to antivirus  while achieving high level security for PCs, laptops, servers. What protections does Panda Managed Office Protection include? Panda Managed Office Protection includes protection against  virus, worms, trojans, spyware, hacking tools, unproductive applications, phising, hoax, rootkits. Its proactive engine allows small and medium companies to be protected against known and unknown threats. Even hidden threats. In addition it provides the possibility to perform In-depth audits. How does Panda Managed Office Protection differ from traditional antivirus protection? Panda Managed Office Protection is a web based security solution that can be installed and managed from anywhere. This characteristic opens the possibility to SMBs to subscribe to a security service that can be easily brought by service providers.
Frequently Asked Questions How does Panda Managed Office Protection benefit from Collective Intelligence? The signature file is automatically updated using the latest signature file that the Collective Intelligence provides. The Collective Intelligence is a security platform which offers proactive and real-time protection to users. It leverages collective knowledge and automates the analysis, correlation, classification and signature generation processes exponentially increasing the malware that it can detect every day.   How is Panda Managed Office Protection deployed? Panda Managed Office Protection can be deployed in two different ways. The first way is by sending an e-mail to the end user which includes a link that will install the protection agent.   The second way does not require of any user intervention. The administrator can push the installation to the selected workstations and the protection agent will be installed transparently. Administrators will be able to choose the workstations that need to be protected by name, IP address or by domain
Frequently Asked Questions How does Panda Managed Office Protection reduce bandwidth consumption? Panda Managed Office Protection reduces bandwidth consumption by avoiding to have a large number of workstations looking for updates at the Internet. Workstations will share the last protections with other workstations throughout the network. This means that any time one workstation needs to get updated, it will first look at other workstations of the same network for the last update before looking at the Internet. What types of report show Panda Managed Office Protection? Panda Managed Office Protection offers the possibility to configure high and low level reports of the detection activity of the network. High level reports will show general activity while low level report will also show the detection activity that has taken place in specific workstations. It also brings the possibility to automatically send daily reports to the end user e-mail box.
Frequently Asked Questions Why is it that users cannot manage their antimalware protection locally? The philosophy of Panda Managed Office Protection is to bring a transparent protection for end users so that they do not need to worry about security issues. Panda Managed Office Protection offers all necessary management privileges to network administrators or service providers in order to smoothly deliver its security including the option of distributing protection with no need of user intervention. What are the main differences between WebAdmin and Panda Managed Office Protection? Panda Managed Office Protection has a Service Provider Console (integrated with an enhanced Web Console with single-sign on), managed firewall protection, Corporate Quarantine,  stronger proactive protection (heuristic) and include in-depth audits.
Frequently Asked Questions How can I move from Webadmin to Panda Managed Office Protection? If you are a Webadmin client that subscribe to Panda Managed Office Protection service for one year, we will add to that year the remaining period that you still have from Webadmin If you are a Webadmin client that subscribe to Panda Managed Office Protection service for two years, we will add to those two years the remaining period that you still have from Webadmin and we will give you one extra year of service.
Technical Rquirements Panda Managed Office Protection Management Console Internet Connection. Applications : Internet Explorer 6.0 or higher (Internet Explorer 6 System Requirements at  http://www.microsoft.com/windows/ie/ie6/evaluation/sysreqs/default.mspx ). Firefox 2.0 (Firefox System Requirements at  http://www.mozilla.com/en-US/firefox/system-requirements.html  ). Platforms:  Microsoft y Linux. Panda Managed Office Protection: Distribution Tool Pentium II 266 MHz (or higher).  64 MB RAM.  Hard Disk: 20 MB Operating systems:  Windows 2000 Professional. Windows XP (32 y 64 bits). Windows Vista (32 y 64 bits). Windows 2000 Server. Windows Server 2003 (32 y 64 bits). Windows Server 2008 (32 y 64 bits). Applications : Windows Installer 2.0 Panda Managed Office Protection for Windows WorkStations Pentium 300 MHz (or higher).  256 MB RAM.  Hard Disk: 130 MB Operating systems:  Windows 2000 Professional. Windows XP (32 y 64 bits). Windows Vista (32 y 64 bits). At least, one WorkStation or Server of the network has to have Internet Connection Panda Managed Office Protection for Windows Servers Pentium 300 MHz (or higher).  256 MB RAM.  Hard Disk: 130 MB Operating systems:  Windows 2000 Server. Windows Server 2003 (32 y 64 bits). Windows Server 2008 (32 y 64 bits) At least, one WorkStation or Server of the network has to have Internet Connection
Revision 1.01 2008

More Related Content

PPTX
IBM Endpoint Manager for Software Use Analysis (Overview)
PDF
Bridging the Gap Between Your Security Defenses and Critical Data
PPT
Panda Cloud Protection - protectie maxima, costuri reduse
PPTX
IBM Endpoint Manager for Lifecycle Management (Overview)
PDF
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
PDF
BigFix White Paper
PPT
Big Fix Architectural Overview
PPT
IBM Endpoint Manager V9.0
IBM Endpoint Manager for Software Use Analysis (Overview)
Bridging the Gap Between Your Security Defenses and Critical Data
Panda Cloud Protection - protectie maxima, costuri reduse
IBM Endpoint Manager for Lifecycle Management (Overview)
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
BigFix White Paper
Big Fix Architectural Overview
IBM Endpoint Manager V9.0

What's hot (20)

PDF
Ivanti New Pricing Model
PPTX
IBM Endpoint Manager for Server Automation (Overview)
PDF
Mc afee saas web protection-rackaid
PPTX
Windows Server 2008 Security Enhancements
PPTX
IBM Endpoint Manger for Power Management (Overview)
PPTX
What’s new in VMware vShield 5 - Customer Presentation
PDF
Icomm agentless-architecture
PPT
How Remote infrastructure Management works
PPTX
IBM Endpoint Manager for Mobile Devices (Overview)
PPTX
e-Zest Remote Infrastructure Management Services (RIM) Services
PPTX
End-point Management
PDF
Veritas Resiliency Platform
PPTX
Managed Desktop Services
PPTX
Desktop management and support
PPT
Remote Infrastructure Management
PDF
Simplifying Systems Management
PPTX
Remote IT Infra - lower cost & higher efficiency
PDF
NIST Definition of Cloud Computing
PDF
ANS Solution Portfolio
PPTX
IBM Endpoint Manager for Server Automation presentation
Ivanti New Pricing Model
IBM Endpoint Manager for Server Automation (Overview)
Mc afee saas web protection-rackaid
Windows Server 2008 Security Enhancements
IBM Endpoint Manger for Power Management (Overview)
What’s new in VMware vShield 5 - Customer Presentation
Icomm agentless-architecture
How Remote infrastructure Management works
IBM Endpoint Manager for Mobile Devices (Overview)
e-Zest Remote Infrastructure Management Services (RIM) Services
End-point Management
Veritas Resiliency Platform
Managed Desktop Services
Desktop management and support
Remote Infrastructure Management
Simplifying Systems Management
Remote IT Infra - lower cost & higher efficiency
NIST Definition of Cloud Computing
ANS Solution Portfolio
IBM Endpoint Manager for Server Automation presentation
Ad

Similar to MOP Technical Presentation.Ppt (20)

POT
MOP Product Presentation
PPT
Panda Cloud Services
PPT
Panda Security: Corporate Presentation
PDF
Panda Security - Endpoint Protection Plus
PPT
GDP Product Presentation
PPTX
Managed Security: How Secure Are You During COVID?
PDF
Complete Endpoint protection
PPTX
Panda Security Corporate Presentation
PDF
Panda Adaptive Defense 360 - Cyber Extortion Guide
PDF
Top 5 Cybersecurity Threats and How Managed IT Services Can Help You Combat T...
PPT
Panda Security2008
PDF
Panda Security - Adaptive Defense
PDF
Panda Security - Endpoint Protection
PPTX
Microsoft-Defender-for-Business-Customer-Ready-Deck copy.pptx
PPTX
Panda Security: Protecting the digital life of our clients
PPT
Panda security corporate_presentation_2012
PDF
Securing Your Business: A Comprehensive Guide to Managed Security Services
PDF
ManagedAntiVirus
PPTX
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
PDF
Cybersecurity Concerns You Should be Thinking About
MOP Product Presentation
Panda Cloud Services
Panda Security: Corporate Presentation
Panda Security - Endpoint Protection Plus
GDP Product Presentation
Managed Security: How Secure Are You During COVID?
Complete Endpoint protection
Panda Security Corporate Presentation
Panda Adaptive Defense 360 - Cyber Extortion Guide
Top 5 Cybersecurity Threats and How Managed IT Services Can Help You Combat T...
Panda Security2008
Panda Security - Adaptive Defense
Panda Security - Endpoint Protection
Microsoft-Defender-for-Business-Customer-Ready-Deck copy.pptx
Panda Security: Protecting the digital life of our clients
Panda security corporate_presentation_2012
Securing Your Business: A Comprehensive Guide to Managed Security Services
ManagedAntiVirus
Simplifying Security for SMBs: Introducing Symantec Endpoint Protection Small...
Cybersecurity Concerns You Should be Thinking About
Ad

Recently uploaded (20)

PDF
Dr. Enrique Segura Ense Group - A Self-Made Entrepreneur And Executive
PDF
Unit 1 Cost Accounting - Cost sheet
PDF
SIMNET Inc – 2023’s Most Trusted IT Services & Solution Provider
PDF
DOC-20250806-WA0002._20250806_112011_0000.pdf
PDF
Chapter 5_Foreign Exchange Market in .pdf
PPTX
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
PPTX
HR Introduction Slide (1).pptx on hr intro
PDF
MSPs in 10 Words - Created by US MSP Network
PPTX
Lecture (1)-Introduction.pptx business communication
PDF
IFRS Notes in your pocket for study all the time
PPTX
Dragon_Fruit_Cultivation_in Nepal ppt.pptx
PDF
Training And Development of Employee .pdf
PDF
Roadmap Map-digital Banking feature MB,IB,AB
PDF
Nidhal Samdaie CV - International Business Consultant
PPTX
The Marketing Journey - Tracey Phillips - Marketing Matters 7-2025.pptx
PPTX
Belch_12e_PPT_Ch18_Accessible_university.pptx
PDF
A Brief Introduction About Julia Allison
PDF
Reconciliation AND MEMORANDUM RECONCILATION
PDF
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
PDF
20250805_A. Stotz All Weather Strategy - Performance review July 2025.pdf
Dr. Enrique Segura Ense Group - A Self-Made Entrepreneur And Executive
Unit 1 Cost Accounting - Cost sheet
SIMNET Inc – 2023’s Most Trusted IT Services & Solution Provider
DOC-20250806-WA0002._20250806_112011_0000.pdf
Chapter 5_Foreign Exchange Market in .pdf
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
HR Introduction Slide (1).pptx on hr intro
MSPs in 10 Words - Created by US MSP Network
Lecture (1)-Introduction.pptx business communication
IFRS Notes in your pocket for study all the time
Dragon_Fruit_Cultivation_in Nepal ppt.pptx
Training And Development of Employee .pdf
Roadmap Map-digital Banking feature MB,IB,AB
Nidhal Samdaie CV - International Business Consultant
The Marketing Journey - Tracey Phillips - Marketing Matters 7-2025.pptx
Belch_12e_PPT_Ch18_Accessible_university.pptx
A Brief Introduction About Julia Allison
Reconciliation AND MEMORANDUM RECONCILATION
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
20250805_A. Stotz All Weather Strategy - Performance review July 2025.pdf

MOP Technical Presentation.Ppt

  • 1. Panda Managed Office Protection Switch from Antivirus to Security as a Service Technical presentation
  • 2. Security Concerns What is Panda Managed Office Protection? How Does it Work? Competitive Analysis How to Sell Sales Policy Business Opportunity for Partners Frequently Asked Questions Sales Kit Table of Contents
  • 3. Security Concerns Panda Managed Office Protection
  • 4. Security Concerns TIME: Traditional antivirus require too much time and effort from SMBs COSTS: Additional hardware and software infrastructure needed. Tight IT budget COMPLEXITY: Complicated management requires dedicated and skilled personnel not focused on core business
  • 5. Complexity and cost in managing desktop antivirus Security Concerns Database Admin servers Console Admins Web server Repository servers Management infrastructure
  • 6. Security Concerns Lack of security-skilled resources Tight IT budget 24x7 monitoring to reduce risk Small and Medium Business Manage geographically distributed offices 24x7 monitoring to reduce risk Low bandwidth consumption Remote Office Branch Office No budget for security management No one in charge of security management Home Office Target Market Security Management Concerns
  • 7. What is Panda Managed Office Protection? Panda Managed Office Protection
  • 8. What is Panda Managed Office Protection? Infrastructure at customer site Management & Monitoring by own personnel Traditional Model Infrastructure hosted at vendor Management and Monitoring by MSSP SaaS & MSSP Model Infrastructure hosted at vendor Management & Monitoring by own personnel SaaS Model
  • 9. Panda Managed Office Protection is a web-based subscription service that removes the cost and management overheads of hardware, personnel and other resources dedicated to antivirus for SMBs What is Panda Managed Office Protection? Subscribe to Security as a Service for your organization .
  • 10. What is Panda Managed Office Protection? Complete protection for SMBs and remote offices Antimalware Firewall HIPS Proactive Protection In-depth Malware Audit Web Console Internet
  • 11. Unmatched Security Data Processing Daily Intelligence at Panda Research 4 MILLION PCs Monitored 9 MILLION Unique Samples Processed 96 MILLION Processes Monitored 340 MILLION Malware Correlations Dedicated Research & Development team at PandaLabs monitors thousands of malware sites gathering 8 Terabytes of information 94.4% of all malware detected in 2007 was managed by Collective Intelligence automatically “ It is a matter of survival for AV vendors, who increasingly are looking for ways to reinvent themselves as their product struggle to thwart new type of infections. Cloud-based, collective intelligence services are the next big thing for anti-malware . I expect that every AV vendor will need to embrace an approach like this if they expect to survive” Yankee Group Collective Intelligence
  • 12. Minimizes Operating Costs Eliminates Complexity Reduces Productivity Loss Improves Risk Management Ensures Business Continuity Prevents Identity Theft Helps Enforce Regulatory Compliance Benefits for Clients
  • 13. How Does it Work? Panda Managed Office Protection
  • 14. How Does it Work? Customer 1 Office 1 Office 2 Administrator Panda Managed Office Protection GNOC Customer 2 Mobile users Administrator Office 2 Install option 1 . Users receive e-mail with link and click to install protection Updates/ upgrades from nearest desktops. Minimizes bandwidth consumption Install option 2 . Push install via distribution tool
  • 15. Panda Managed Office Protection Features and Functionalities
  • 16. Features Proactive Protection against Unknown Malware Files, Email, Internet Browsing and Instant Messaging Protection Managed Personal Firewall and HIPS In-depth Malware Audits Web Administration Console
  • 17. Features Web Administration Console (Status) License status and detection activity by type of malware and by source
  • 18. Features Web Administration Console Direct acces to Malware Radar in order to perform in-depth audits
  • 19. Features Web Administration Console (Monitoring)
  • 20. Features Web Administration Console (Protection)
  • 21. Features Web Administration Console (Install Protection) Application of installation package manually or through external distribution systems
  • 22. Features Web Administration Console (Install Protection) Installation through e-mail
  • 23. Features Web Administration Console (Install Protection) Download installation tool in order to push installation with no user intervention
  • 24. Features Web Administration Console (Install Protection) Installation can be pushed romotely to selected stations with no user intervention
  • 25. Features Web Administration Console (Profile)
  • 26. Features Web Administration Console (Profile) For modifying update rules of protected stations
  • 27. Features Web Administration Console (Profile)
  • 28. Features Web Administration Console (Profile)
  • 29. Features Web Administration Console (Profile)
  • 30. Features Web Administration Console (Firewall) Centrallized or locally managed firewall
  • 31. Features Web Administration Console (Firewall)
  • 32. Features Web Administration Console (Firewall)
  • 34. Features Web Administration Console (Firewall)
  • 35. Features Web Administration Console (Groups) Assign security profiles by groups Check existing security profiles
  • 41. Functionalities P2P Updates / Upgrades Profile Based Protection Delegated Administration Management Flexible Installation Daily Status Reports in your e-mail Automatic and on-demand Upgrades / Updates
  • 42. Uninstallers available * Coming soon Norton Internet Security (Home, Home/Office, Enterprise and SMB Edition) Symantec EndPoint Protection 11 Symantec Antivirus 10.3 (all editions) Symantec Antivirus 10.1 (all editions) Trend Micro Client Server Security for SMB Trend Micro (PC-cillin) Internet Security 2008* Panda WebAdmin (all versions) Panda Antivirus 2008 Panda Antivirus + Firewall 2008 Panda Internet Security 2008 Panda for Desktops 4.x Panda for File Servers 4.x Avast* AVG* McAfee VirusScan Enterprise 8.5i McAfee VirusScan Enterprise 8.0i McAfee Internet Security Suite 2007 McAfee Total Protection 2008 F-Secure Protection Service for Business F-Secure Antivirus 5.52 Antivirus 2004 (Home Edition) F-Secure Antivirus Client Security 7.X Kaspersky Work Space Security Kaspersky Business Space Security Kaspersky Anti-Virus 7.0 Microsoft Live OneCare Sophos Anti-virus SBE 2.5 Sophos Security Suite Antivirus Automatically Uninstalled by Panda
  • 43. Competitive Analysis Panda Managed Office Protection
  • 44. Competitive Analysis Local console for end user   Panda Security McAfee F-Secure Trend Micro Personal and managed firewall (HIPS) Behavioral proactive heuristic detection E-mail protection Internet browsing protection Delegated Administration management P2P upgrades and updates On-demand local update On-demand remote upgrades by group Malware Audit Service McAfee’s main weakness: lacks some basic protections such as static behavioral analysis or e-mail protection Panda’s advantage: offers proactive detection and all necessary protections for securing small business F-Secure’s main weakness: lacks functionalities for end user management such as local console or on-demand local updates Panda’s advantage: offers more complete protection and options for local management Trend Micro’s main weakness : needs installation “in-house” in order to manage protections remotely Panda’s advantage: can be deployed and managed remotely
  • 45. Frequently Asked Questions Panda Managed Office Protection
  • 46. Frequently Asked Questions How can Panda Managed Office Protection help SMBs be protected? Panda Managed Office Protection is a solution for small and medium business that removes the cost and management overheads of hardware, personnel and other resources dedicated to antivirus while achieving high level security for PCs, laptops, servers. What protections does Panda Managed Office Protection include? Panda Managed Office Protection includes protection against virus, worms, trojans, spyware, hacking tools, unproductive applications, phising, hoax, rootkits. Its proactive engine allows small and medium companies to be protected against known and unknown threats. Even hidden threats. In addition it provides the possibility to perform In-depth audits. How does Panda Managed Office Protection differ from traditional antivirus protection? Panda Managed Office Protection is a web based security solution that can be installed and managed from anywhere. This characteristic opens the possibility to SMBs to subscribe to a security service that can be easily brought by service providers.
  • 47. Frequently Asked Questions How does Panda Managed Office Protection benefit from Collective Intelligence? The signature file is automatically updated using the latest signature file that the Collective Intelligence provides. The Collective Intelligence is a security platform which offers proactive and real-time protection to users. It leverages collective knowledge and automates the analysis, correlation, classification and signature generation processes exponentially increasing the malware that it can detect every day. How is Panda Managed Office Protection deployed? Panda Managed Office Protection can be deployed in two different ways. The first way is by sending an e-mail to the end user which includes a link that will install the protection agent. The second way does not require of any user intervention. The administrator can push the installation to the selected workstations and the protection agent will be installed transparently. Administrators will be able to choose the workstations that need to be protected by name, IP address or by domain
  • 48. Frequently Asked Questions How does Panda Managed Office Protection reduce bandwidth consumption? Panda Managed Office Protection reduces bandwidth consumption by avoiding to have a large number of workstations looking for updates at the Internet. Workstations will share the last protections with other workstations throughout the network. This means that any time one workstation needs to get updated, it will first look at other workstations of the same network for the last update before looking at the Internet. What types of report show Panda Managed Office Protection? Panda Managed Office Protection offers the possibility to configure high and low level reports of the detection activity of the network. High level reports will show general activity while low level report will also show the detection activity that has taken place in specific workstations. It also brings the possibility to automatically send daily reports to the end user e-mail box.
  • 49. Frequently Asked Questions Why is it that users cannot manage their antimalware protection locally? The philosophy of Panda Managed Office Protection is to bring a transparent protection for end users so that they do not need to worry about security issues. Panda Managed Office Protection offers all necessary management privileges to network administrators or service providers in order to smoothly deliver its security including the option of distributing protection with no need of user intervention. What are the main differences between WebAdmin and Panda Managed Office Protection? Panda Managed Office Protection has a Service Provider Console (integrated with an enhanced Web Console with single-sign on), managed firewall protection, Corporate Quarantine, stronger proactive protection (heuristic) and include in-depth audits.
  • 50. Frequently Asked Questions How can I move from Webadmin to Panda Managed Office Protection? If you are a Webadmin client that subscribe to Panda Managed Office Protection service for one year, we will add to that year the remaining period that you still have from Webadmin If you are a Webadmin client that subscribe to Panda Managed Office Protection service for two years, we will add to those two years the remaining period that you still have from Webadmin and we will give you one extra year of service.
  • 51. Technical Rquirements Panda Managed Office Protection Management Console Internet Connection. Applications : Internet Explorer 6.0 or higher (Internet Explorer 6 System Requirements at http://www.microsoft.com/windows/ie/ie6/evaluation/sysreqs/default.mspx ). Firefox 2.0 (Firefox System Requirements at http://www.mozilla.com/en-US/firefox/system-requirements.html ). Platforms: Microsoft y Linux. Panda Managed Office Protection: Distribution Tool Pentium II 266 MHz (or higher). 64 MB RAM. Hard Disk: 20 MB Operating systems: Windows 2000 Professional. Windows XP (32 y 64 bits). Windows Vista (32 y 64 bits). Windows 2000 Server. Windows Server 2003 (32 y 64 bits). Windows Server 2008 (32 y 64 bits). Applications : Windows Installer 2.0 Panda Managed Office Protection for Windows WorkStations Pentium 300 MHz (or higher). 256 MB RAM. Hard Disk: 130 MB Operating systems: Windows 2000 Professional. Windows XP (32 y 64 bits). Windows Vista (32 y 64 bits). At least, one WorkStation or Server of the network has to have Internet Connection Panda Managed Office Protection for Windows Servers Pentium 300 MHz (or higher). 256 MB RAM. Hard Disk: 130 MB Operating systems: Windows 2000 Server. Windows Server 2003 (32 y 64 bits). Windows Server 2008 (32 y 64 bits) At least, one WorkStation or Server of the network has to have Internet Connection