Panda Endpoint Protection

Panda-234

Score     96.56%

Buy Now



How are TSA Scores determined?

The Software Authority strives to be different! Our results are based on factual data and you will never see a non-certified product that you never heard of being rated highly for the sole purpose of pushing sales like we often see on other review sites.

With increasing computer processor speeds being able to handle heavy workloads and improving performance significantly, TSA Scores are focused more on how well a security product protects your system from malware, viruses, and threats as opposed to how much system impact does this security product have. Reality is, if you obtain a nasty Ransomware virus as an example, does having a product that uses limited computer resources matter if you can no longer access your computer?

The TSA Score is determined by analyzing the latest review data from multiple independent testing laboratories, other reputable third party review sites and our many years of experience in the security software industry. The results from these sources are then inputted into a proprietary formula that determines the final TSA Score.

Independent Lab Results


Description

Panda Endpoint Protection

Manage the security of all computers in your network and control user productivity at the lowest possible cost of ownership with Panda Endpoint Protection.

SIMPLE AND CENTRALIZED SECURITY FOR ALL DEVICES

Centralized management of security and product upgrades through a simple Web browser for all network workstations and servers. Manage your Windows, Linux, Exchange Server, Mac OS X or Android protection from a single administration console.

ANDROID ANTI-THEFT

Secure organization information on Android with Remote Locate, Lock and Wipe functions for mislaid or misappropriated devices.

REMEDIAL ACTIONS

Run Cleaner Monitor remotely and repair workstations infected with advanced or non-conventional malware.

REAL-TIME MONITORING AND REPORTS

Detailed monitoring of your IT infrastructure with real-time dashboards. Reports can be generated or scheduled and sent automatically.

PROFILE-BASED PROTECTION

Assign profile-based protection policies, ensuring the most appropriate policies are applied to each group of users.

CENTRALIZED DEVICE CONTROL

Prevent malware entry and data loss by blocking device types, whitelisting specific devices and controlling actions.

WEB MONITORING AND FILTERING

Increase user productivity by preventing, limiting or monitoring access to unproductive or unsuitable, regardless of the type of browser used.

NO MORE SATURATED MAILBOXES

Protect your Exchange servers and users with content filter, anti-malware and anti-spam engines.

MALWARE FREEZER

Do not get burnt by false positives again. Malware Freezer locks detected malware for seven days just in case there is a false positive, in which case the file is automatically restored to the system.

System Requirements

System Requirements

Web Console

– Internet connection.
– Browser: Internet Explorer, Firefox 3.0, Google Chrome.

For workstations / file servers

– At least one with an Internet connection.
– Operating systems (workstations): Windows 2000 Professional, XP SP0 & SP1, SP2 and later, Vista, 7, 8 & 8.1, 10.
– Operating systems (servers): Windows 2000 Server, Home Server, 2003 (32, 64 bits and R2) SP1 and greater, 2008, 2008 R2 (64 bits), SBS 2011, Server 2012 (64 bit and R2).

For exchange server

– Microsoft Exchange Server 2003, 2007, 2010 & 2013

For MAC workstations / file servers

– Mac OS X 10.6 Snow leopard, 10.7 Lion, 10.8 Mountain Lion, 10.9 Mavericks, 10.10 Yosemite

For Linux workstations / file servers

– Ubuntu 12 32/64 bits and later
– Red Hat Enterprise Linux 6.0 64 bits and later
– CentOS 6.0 64 bits and later
– Debian 6.9 Squeeze and later
– OpenSuse 12 32/64 bits and later
– Suse Enterprise Server 11SP2 64 bits and later

For Android devices

– Android (from 2.3)

Virtual engine certified

– VMWare ESX 3.x,4.x, 5,x
– VMWare Workstation 6.0, 6.5, 7.x, 8.x & 9.x
– Virtual PC 6.x
– Microsoft Hyper-V Server 2008 R2 & 2012 3.0
– Citrix XenDesktop 5.x, XenClient 4.x, XenServer and XenApp 5.x & 6.x


Avast-234 Avast Endpoint Protection Gold Award Winner

AVG-234 AVG AntiVirus Business Silver Award Winner