PANDA Endpoint Security Reviews & Details

Panda Endpoint Security helps businesses to analyze and classify various malware samples that guarantee protection against internet threats. The company provides SaaS protection for endpoints, web, and email security. Panda Endpoint Protection provides users with a centralized and advanced protection for all their Windows, Mac and Linux workstations. Panda Endpoint Protection Plus additionally provides protection for Exchange servers as well. Panda Fusion secures and supports all of the organization's IT infrastructure devices. Panda Email Protection offers multi-layer protection for the businesses' email against all types threats. Panda Patch Management handles vulnerabilities and their corresponding patches, both for operating systems and numerous applications.

USP : Panda Endpoint Security is one of the premium providers of cloud-based security and on-premises security solutions for enterprises and home users. The company provides SaaS protection for endpoints, web, and email security. The company helps organizations by providing unparalleled protection against malware and other unknown threats. It automates infrastructure management systems and provides users with a centralized control. Panda offers one of the best support experience in amongst its competitors by conducting proactive troubleshooting and remote, non-intrusive access to devices, irrespective of their locations.

BUYERS
VENDORS
EXPERTS
2.5
ANALYSTS
 

PANDA SECURITY detailed analysis

Product Maturity
Company Maturity
Use Case Maturity
Most IMPORTANT
0.0
0.0
0.0
Product Quality and Reliability
3.30
3.50
4.15
Product Features and Functionality
3.50
4.05
5.00
Breadth and Depth of Product Offering
5.00
5.00
4.15
LEAST IMPORTANT LESS IMPORTANT

PARTICIPATING QUADRANTS

PANDA SECURITY has chosen it’s strengths in these 3 territories
  • Niche Quadrant

    All-Europe

    11 Participants

  • Niche Quadrant

    All-North America

    11 Participants

  • Niche Quadrant

    Education-All

    11 Participants

STRENGTHS
  • Product Maturity / Deployment Model
    Cloud
  • Product Maturity / Deployment Type
    Android
  • Product Maturity / Deployment Type
    Installed
  • Product Maturity / Deployment Type
    iOS
  • Product Maturity / Deployment Type
    Web-Based
  • Product Maturity / Services
    Education & Certification
  • Product Maturity / Services
    Free Clean-up Tools
  • Product Maturity / Services
    Free Downloads
  • Product Maturity / Services
    Renewals & Registration
  • Product Maturity / Services
    Technical Support
  • Product Maturity / Services
    Virus & Threat Help
  • Product Maturity / Licensing
    Business
  • Product Maturity / Licensing
    Enterprise
  • Product Maturity / Costs & Units
    $ per license
  • Product Maturity / Respond
    Automated Malware Removal
  • Product Maturity / Respond
    Block targeted attacks
  • Product Maturity / Respond
    Root Cause Analysis
  • Product Maturity / Data Security
    Encryption of Data
  • Product Maturity / Data Security
    Monitor the Data access
  • Product Maturity / Detection
    Active Adversary Mitigations
WEAKNESSES
  • Product Maturity / Deployment Model
    Hybrid
  • Product Maturity / Deployment Model
    On-Premises
  • Product Maturity / Costs & Units
    $ per Month/Yearly
  • Product Maturity / Respond
    Synchronized Security Heartbeat
  • Product Maturity / Data Security
    Control File Integrity
  • Product Maturity / Data Security
    Prevent Data Loss
  • Product Maturity / Data Security
    Segregation of Network
  • Product Maturity / Detection
    Man-in-the-Browser Protection (Safe Browsing)
  • Product Maturity / Detection
    Ransomware File Protection (CryptoGuard)
  • Product Maturity / Prevention
    Live Protection
  • Product Maturity / Prevention
    Anti-Malware File Scanning
  • Product Maturity / Prevention
    Application Control
  • Product Maturity / Prevention
    Client Firewal
  • Product Maturity / Prevention
    Deep Learning malware detection
  • Product Maturity / Prevention
    Exploit Prevention
  • Product Maturity / Prevention
    Peripheral Control (e.g. USB)
  • Product Maturity / Prevention
    Potentially Unwanted Application (PUA) Blocking
  • Product Maturity / Prevention
    Pre-execution Behavior Analysis (HIPS)
  • Product Maturity / Prevention
    Prevent data breaches
  • Product Maturity / Prevention
    Stop fileless attacks
See More

Have you EVER used PANDA SECURITY Products?

Share your experience with potential buyers.

TOP USECASES
TOP FEATURES
  • Product Features and Functionality
    Prevention
  • Product Features and Functionality
    Detection
  • Product Features and Functionality
    Respond
  • Product Features and Functionality
    Data Security
  • Product Features and Functionality
    Licensing
  • Product Features and Functionality
    Costs & Units
  • Detection
    Active Adversary Mitigations
  • Data Security
    Encryption of Data
  • Data Security
    Monitor the Data access
  • Prevention
    Prevent data breaches

CONNECT with this company

360 Connect helps you reach out to vendors and find the right people connect to it. Think of it as a concierge service for businesses to connect with other businesses, to buy, sell or invest in.

Questions & Answers

TOP REVIEWS

Get help

BE THE FIRST ONE TO REVIEW

Share your experience with potential buyers.

TOP NEWS


...

Marie Stelle

Engagement Partner - 360Quadrants.com