ENDPOINT PROTECTION

Protect all the computers on your network with the best enterprise antivirus solution

Manage the security of your corporate network from the cloud, wherever you are

Ask for a DEMO

Get a 30-day trial of Endpoint Protection

Buy US $ 34.85

Not including VAT

 
 

KEEP ANY COMPUTER OR DEVICE THAT CONNECTS TO YOUR COMPANY VIRUS FREE

Endpoint Protection provides centralized protection for all of your Windows, Mac and Linux workstations, including laptops, smartphones and the leading virtualization systems.

 

WHY DO I NEED AN ENTERPRISE ANTIVIRUS SOLUTION LIKE ENDPOINT PROTECTION?

Centralized management
from the cloud

All operations are performed in the cloud. Therefore, the impact of the antivirus on system performance is virtually zero.

Cross-platform
protection

Endpoint Protection protects all of your computers running Windows, Linux, Mac OS X, in addition to Android smartphones and tablets, against known and unknown (Zero-Day) threats.

 

Minimizes maintenance
costs

Our antivirus solution does not require additional infrastructure in your offices, minimizing the investment needed.

Real-time
monitoring

Remotely monitor, control and adjust the security level of all network devices.

 
 

DISCOVER ENDPOINT PROTECTION IN DEPTH

Protection and disinfection

  • Proactive and real-time protection from the cloud thanks to Panda Security's Collective Intelligence.
  • Maximum malware detection, even for malware that exploits unknown (zero-day) vulnerabilities, regardless of the source of infection (email, USB memory sticks, Web, etc).

Ease to use, easy to maintain

  • Manage the security of all users from anywhere from the Web console.
  • Simple, automatic and/or remote installation.
  • Automatic or scheduled transparent updates to avoid any inconvenience to the user.

A level of security for each situation and environment

  • Profile-based security to adapt the protection to the specific needs of your users.
  • Centralized monitoring of the security status of all PCs, servers and laptops through comprehensive dashboards.
  • Device control to block entire peripheral device categories (USB drives and modems, webcams, DVD/CD, etc.) with whitelists and control of permitted actions (access, read, write).

MORE BENEFITS OF ENDPOINT PROTECTION

CLEANER MONITOR: REPAIR ANY INFECTED COMPUTER

Run the separate Cleaner Monitor tool remotely and repair workstations infected with advanced or non-conventional malware.

REAL-TIME MONITORING AND REPORTS

With Endpoint Protection you can carefully monitor the security of your corporate network.

Automatically generate easy to interpret reports and graphs or consult all of this data in real time thorough comprehensive dashboards.

PROFILE-BASED CONFIGURATION

Assign different protection policies to users through configuration profiles.

Apply different levels of protection according to the profile of the user that connects to your corporate network.

 

DEVICE CONTROL

Avoid malware entry and data leaks by blocking device categories: USB memory sticks and modems, webcams, DVD/CD drives, etc.

In addition, you can establish exceptions with device whitelists, or simply block certain dangerous actions (access, read, write) on protected computers.

FLEXIBLE AND RAPID INSTALLATION

Deploying the antivirus across complex networks has never been easier.

You can use two methods to install the antivirus on all the endpoints on your network: via an email with a download URL or transparently with the Endpoint Protection deployment tool (compatible with Active Directory, Tivoli, SMS etc.).

MALWARE FREEZER

With Malware Freezer you can avoid any false positives. Freeze the malware detected for seven days and if it is a false alarm, automatically restore the file on the user's system.

 
 

Mark Gurney, IT Manager Bramwell Pub Company (315 licenses, 90 networks)

"With Panda Cloud Office Protection, on-going maintenance is almost non-existent. The automatic reports showing intrusions stopped and peace of mind from the management console consistently showing green ticks and graphs assures us the protection is working."



Read more »

Frank Beks, Managing Director of SKOOL / PARADIGIT (400,000 licenses in 1,700 schools)

The advantages of Endpoint Protection? Its easy administration, the anti-spyware module which we found lacking in other products and the fact that Panda Security employs strategic thinking.

We couldn't allow the security to conflict with other applications, which is what happened with other antivirus solutions. We were unable to integrate these solutions in our Skool project. Endpoint Protection presented absolutely no problems in that respect."


Read more »

Hennie Kotze. Head of IT Sedibeng Water

"Managing the console is easy and understandable. Panda is almost maintenance free."





Read more »

Ministry for Science and Innovation (SPAIN) Maria Antonia Lopez Avila, IT Area Director.

"Thanks to this new solution, product implementation is quicker, management is easy and simple, and is carried out from a single Web page without requiring the installation of management software, maintenance costs are extremely low, and so is the computer resource usage."


Read more »

Rob Kay. IT Manager. RDS-Global

"Panda Cloud Office Protection is a ‘perfect fit’ for RDS-Global as all updates are automatic with no need for support team intervention. This means that we can focus on our core business of providing the highest levels of support and service to our customers.”



Read more »

 

COMPARE ALL OF PANDA SECURITY'S ENTERPRISE ANTIVIRUS SOLUTIONS

  Endpoint
Protection
Endpoint
Protection Plus
Fusion
Centralized cloud console
Complete, multidevice anti-malware protection
((Windows, Mac OS X, Linux and Android)
Complete reports and dashboards
Device control
Integrated antivirus and anti-spam protection for Exchange
Web filtering by category and Web browsing monitoring
Anti-theft protection for mobile devices
System Management
(IT management service)
  Try it More info Try it More info Try it More info

PANDA SECURITY CERTIFICATIONS

  • AV comparatives
  • Virus Bulletin
 

TECHNICAL REQUIREMENTS

WEB CONSOLE »

  • Internet connection
  • Internet Explorer 7.0 or later
  • Firefox 3.0 or later
  • Google Chrome 2.0 or later

WINDOWS WORKSTATIONS AND FILE SERVERS »

  • At least one of the workstations or file servers must have an Internet connection.
  • Workstation operating systems supported: Windows 2000 Professional, Windows XP SP0 and SP1 (32 and 64-bit), XP SP2 and later, Vista, Windows 7 and Windows 8.1 (32 and 64-bit)
  • Server operating systems supported: Windows 2000 Server, Windows Home Server, Windows 2003 (32, 64-bit and R2) SP1 and later, Windows 2008 32 and 64-bit, Windows 2008 R2 (64-bit), Windows Small Business Server 2011, Windows Server 2012 (64-bit and R2).

MAC WORKSTATIONS AND FILE SERVERS »

  • Mac OS X 10.6 Snow leopard.
  • Mac OS X 10.7 Lion.
  • Mac OS X 10.8 Mountain Lion.
  • Mac OS X 10.9 Mavericks.
  • Mac OS X 10.10 Yosemite.

TABLETS AND SMARTPHONES »

  • Android 2.3 (Gingerbread) and later.

LINUX WORKSTATIONS AND FILE SERVERS »

  • Ubuntu 12 32/64-bit and later.
  • Red Hat Enterprise Linux 6.0 64-bit and later.
  • CentOS 6.0 64-bit and later.
  • Debian 6.0 Squeeze and later.
  • OpenSuse 12 32/64-bit and later.
  • Suse Enterprise Server 11SP2 64-bit and later..

CERTIFICATIONS IN VIRTUALIZATION ENVIRONMENTS »

  • VMWare ESX 3.x,4.x, 5,x
  • VMWare Workstation 6.0, 6.5, 7.x, 8.x and 9.x
  • Virtual PC 6.x
  • Microsoft Hyper-V Server 2008 R2 and 2012 3.0
  • Citrix XenDesktop 5.x, XenClient 4.x, XenServer and XenApp 5.x and 6.x

DOCUMENTATION

PRODUCT DATA SHEETS »

CASE STUDIES »

WHITEPAPERS »