Need Support ? Click Here
Reduce the risk and complexity of vulnerabilities in systems and third party applications
Panda Patch Management is a solution to manage vulnerabilities and their corresponding updates and patches, both for operating systems and hundreds of applications.
Strengthens threat prevention, containment and remediation capabilities, reducing the attack surface on Windows servers and workstations.
Provides visibility of endpoint health in real time, in terms of vulnerabilities, patches or pending updates, and unsupported software (EoL). Discover, plan, install, and monitor.
Companies and third party applications included in Panda Patch Management.
Panda Patch Management is compatible with all our endpoint solutions on the Aether platform
Supported operating systems: Windows XP SP3+. Windows Server 2003 (32/64 bits and R2) SP2+
The first line of defense to protect data simply and effectively
Panda Full Encryption, is an additional module for Panda Security’s endpoint protection and advanced adaptive security solutions, designed to centrally manage full disk encryption.
Panda Full Encryption leverages BitLocker, a proven and stable Microsoft technology, to encrypt and decrypt disks without impacting end users and providing organizations with the added value of centrally controlling and managing the recovery keys stored on Panda Security’s cloud-based management platform: Aether.
This module aggregates all the data gathered, correlating and graphically presenting it in real time to offer granular visibility into any event that takes place on the network.
The Advanced Reporting Tool dashboards include key indicators, searches and preset alerts across three areas:
- Security incidents.
- Access to critical information.
- Network resources and applications used.
Security Intelligence That Reaches Your Company’s SIEM System
SIEM Feeder provides a new source of critical and valuable information into your current SIEM tool. It collects and correlates all the processes run on endpoints, allowing organizations to turn massive volumes of data into useful information for decision making, and thus enriching the organization with the knowledge provided by Adaptive Defense.