PANDA CLOUD PROTECTIONSaaS Security for endpoints, email and Web traffic:
The complete, secure, light and simple solution
2
SECURITY CONERNS
WHAT IS PANDA CLOUD PROTECTION?
¿HOW DOES IT WORK?
CLIENTS BENEFITS
FEATURES
INDEX
SECURITY CONERNS
WHAT IS PANDA CLOUD PROTECTION?
¿HOW DOES IT WORK?
CLIENTS BENEFITS
FEATURES
INDEX
3
CYBER CRIMES keep increasing:Hackers try to access into companies PCs to steal
confidential, proprietary, sensitive data or money.
Security Concerns
Small and medium-sized businesses face the same security problems threats as large companies
Newer threats such as bots, phishing and malicious active content attack users as they use the Internet or email, and subsequently infect corporate networks.
Cybercriminal takes advantage of the company’s infrastructure to execute their crimes: send SPAM, attack other businesses, install unwanted programs, etc.
4
2004 2006 2007 2008 2009 2010 *
60 million
Source: Pandalabs
MARKET SITUATIONEXPONTENTIAL INCREASE
Malware samples received at PandaLabs
40 million
15 Mil
X2 X10
Security Concerns
5
MALWARE DESIGNED FOR ECOMONIC GAIN
Malware detected in 2009
AdwareSpyware
TrojanWorm
Others
source: Pandalabs
31,05%
59,53%
1.96%
2.93%
4.53%Malware and Spam affect all companies equally, regardless of company size
Security Concerns
6
WEB 2.0 CHALLANGES
Security Threats are no longer static: Stealth, polymorphic threats.
Data Leakage: Read only copies of data no longer the problem, up to 80% of data leakage is done over the web (email, blogs, IM, Webmail, News Channels)
Web Access Control: User created content boom. Web sites (networks, blogs, communities) are extremely dynamic, statically classifying them is no longer valid. Who accesses what and when?
Bandwidth: 75%-90% of bandwidth is used for Web Traffic. New bandwidth hogs and risks (Streaming, P2P).
The Internet is the tool of choice for nearly all companies today.
Security Concerns
7
8
New Organizational CHALLENGES:Distributed workforces exacerbate security issues by lessening
central control
Road warriors: “I am hardly ever in the office”. Road warriors need personal and confidential data
Remote office require additional solutions which decentralizes control and adds to TCO and maintenance overheads
Teleworking: “I work from home”. Growing trend in working from home which adds more non-secure PCs to the problem. PCs used for personal use as well as professional.
Managers: “I need to be constantly connected”. Managers using Smartphone, PDA devices . They deal with business critical data in non-secure environments
Security Concerns
9
Productivity Loss: “Non-work-related Internet surfing results in an estimated 40% productivity loss each year for American businesses”1
Expensive and impractical solutions: Fragmented and partial security solutions decentralize control whilst increasing TCO and management overheadsSaturated Bandwidth by non work related activities and applications further exacerbates productivity issues.
1: Gartner
Security Concerns
BOTTOM LINE
Servers
Database Servers
SECURITY AND BUSINESS CONTINUITY
Email Servers
XX
X
X
X
XX
Admin
Security Concerns
Complexity and cost in managing antimalware and antispam at endpoints, email and web traffic
10
Traditional antivirus require too much time and effort from SMBs
TIME
Additional hardware and software infrastructure needed. Tight IT budget
Complicated management requires dedicated and skilled personnel not focused on core business
COSTS
COMPLEXITY
Security Concerns
11
Company Pain points
Who suffers the consequences?
SMALL AND MEDIUM BUSINESS
REMOTE OFFICE BRANCH OFFICE
HOME OFFICE
-No budget for security management
-No one in charge of security management
ENTERPRISE
-Lack of security-skilled resources
-Tight IT budget
-Manage geographically distributed offices
-Low bandwidth consumption
-Global Protection: Web, Email, Endpoints
- 24x7 monitoring to reduce and manage risks
-Exhaustive security control and enforcement of regulations (HIPAA, PCI, etc)
12
Custom Mountain Bike PLC
Manufacturer of custom Mountain Bikes
Revenue of ₤ 560,000 in 2009
27 employees. Factory + 3 remote off. + 7 Comm. Rep.
He is gaining Market Share, he is extending the business
CEO’s main concerns:
Liquidity
Reduce Fixed cost
Increase Productivity: On-line Order System
Open new office in a month
Ensure business continuity
STEVE BROWN
CEO
Case Study
13
Network, Hardware and Software Manager
Web Manager of the new On-line Order System
IT Resp. for the new Office. No budget for Security Server
30% of time putting out fires
Cannot keep up with security & administrative tasks
Tim’s main concerns:
Improve Security: Factory, Remote Off. & Laptops. Complex management due to several gateways and roadwarriors
Worry about the new threats in internet (rogueware, Web 2.0, etc)
Reduce mail server load
Reduce Fixed & Operational Cost
Reduce Time in Security maintenance & travelling, and Focus on the business needs
TIM
“THE IT GUY”
Case Study
14
SECURITY CONERNS
WHAT IS PANDA CLOUD PROTECTION?
¿HOW DOES IT WORK?
CLIENTS BENEFITS
FEATURES
INDEX
15
WHAT IS SaaS?
Security as a Service (SaaS*) means delivering traditional security applications as an Internet-based service to customers. SaaS main characteristics:
Subscription service
Hosted service
High availability 24x7
Web-based interface
Always updated
Short improvements cycle
Low TCO
Opportunity: SaaS
16*Security as a Service applied to Security is also known as SecaaS by Gartner
Panda Cloud Office Protection (SaaS) vs. Software/Appliance
PANDA CLOUD PROTECTION
Hosted by Panda, light on client side
Web Console 24/7.
No investment in HW/SW
No dedicated resource needed
One solution for entire organization
Redirect traffic once and forget about it
No maintenance for HW / SW, databases, updates, upgrades, outages
Any user, any device, anytime from anywhere
SOFTWARE/APPLIANCE
On premise
Installed locally
Higher TCO
Dedicated It recourses
Fragment, multi single point solutions
More complex. More time consuming
HW and SW maintenance , databases, updates, outages..
Unmanaged, more complex to protect
Infrastructure
Console
Cost
IT resources
Centralized
Installation
Ease of use
Mobile users
Opportunity: SaaS
17
SaaS in today's businesses
Opportunity: SaaS
18
SaaS Security Markets
Opportunity: SaaS
19
WHAT?Complete SaaS security suite that protects all the threat entry points: endpoints, email and web traffic
HOW?•Delivery model Software as a Service (SaaS)•Real time connection to the Collective Intelligence
BENEFITS•Proactive and robust protection•Minimum costs•Minimum resources consumption•Easy to use, easy to maintain
Headquaters
Road warriors
Remote Office
PANDA CLOUD PROTECTION
Panda Cloud Protection
20
Panda Cloud Protection Portfolio
PANDA CLOUD OFFICE PROTECTION
PANDA CLOUD OFFICE PROTECTION
0
Complete SaaS security suite that protects all the threat entry points: endpoints, email and web traffic
PANDA CLOUD PROTECTION
PANDA CLOUD EMAIL
PROTECTION
PANDA CLOUD INTERNET
PROTECTION
PANDA CLOUD OFFICE
PROTECTION
PANDA CLOUD OFFICE PROTECTION
•SaaS Security Solution for endpoints connected in real time to the Collective Intelligence
•Uninterrupted protection for PCs, laptops and servers
PANDA CLOUD EMAIL PROTECTION
•SaaS Security Solution for email traffic connected in real time to the Collective Intelligence
•Elimates spam, known and unknown malware and phishing, before they reach the perimeter
PANDA CLOUD INTERNET PROTECTION
•SaaS Security Solution for web traffic connected in real time to the Collective Intelligence
•Protection against Internet threats, dynamic URLs access and Web 2.0 application control
•Data loss prevention and bandwidth usage control
21
Panda Cloud Protection
Panda Cloud Office Protection
22
15 protection modules
Collective Intelligence Centralized
Management Unified Security Policies Zero Infrastrucuture
Management
COLLECTIVE INTELLIGENCE
Unmatched Security Data Processing
Collective Intelligence
Daily Intelligence at Panda Research100 MILLION - Unique Samples Processed
75.000 - Samples Received Daily
55.000 – Unique Samples Daily
52% of Malware “live” 24 hours99.4% of all malware detected is managed by Collective Intelligence automatically
Dedicated Research & Development team at PandaLabs monitors thousands of malware sites gathering 18 Terabytes of information
Truprevent
Antivirus
AntimalwareIt is a matter of survival for AV vendors, who increasingly are looking for ways to reinvent themselves as their product struggle to thwart new type of infections
Cloud-based, collective intelligence services are the next big thing for anti-malware
I expect that every AV vendor will need to embrace an approach like this if they expect to survive
Yankee Group
23
SECURITY CONERNS
WHAT IS PANDA CLOUD PROTECTION?
¿HOW DOES IT WORK?
CLIENTS BENEFITS
FEATURES
INDEX
24
25
CLIENTS BENEFITSRobust protection for endpoints, email and web with 15 modules
No initial investment , maintenance, nor specialized resources
Minimizes resource consumption at endpoint, network and email servers
Automatic updates / upgrades
Easy to use. Installation and management centralized and remote
Anywhere availability 24/7
Web access control, dynamic URL filtering. Web 2.0 and bandwidth usage control
Regulations compliance, data leak prevention and Green IT alligment
25
Clients Benefits
• Proactive anti-malware protection based on Collective Intelligence for PCs, laptops and servers, email and web traffic
•Firewall, anti-spam, content filtering, web mail and email backup
•Anti-spyware, protection against bots, phising, cross site scripting and other advanced Web 2.0 threats
Robust protection
• No initial investment. Costs are predictable• No hardware and software maintenance. No IT specialized resources• There are no upgrade costs as these are completely automatic and transparent
• It reduces the time and resources by 80% in comparison with security appliances
Minimal costs
• Collective Intelligence minimizes resource consumption• Optimized update technologies ensure minimal bandwidth usage• The elimination of non-productive traffic, before it reaches to the perimeter, optimizes network resources and reduces server workloads
Minimal resource
consumption
• Startup is in a matter of minutes, regardless of users location• Infrastructure maintenance and updates are managed by Panda Security
• Console available 24x7 from anywhere
Easy to use, easy to
maintain• Static and dynamic URL filtering• Control over access to Web 2.0 applications• Forensic analysis: Centralized nanologs and forensic functionalities• Control over access to the web and bandwidth use
Comprehensive Security
Control• Data loss prevention (DLP)• Centralized security management, reports, profile-based security policies and periodic audits aid compliance with regulations: SOX, PCI, HIPAA
• Green IT: Reduced energy bills, environmental impact, Improved corporate image - environmental responsibility
Regulatory
compliance & Green
IT
Clients Benefits
26
27
How does Panda Cloud Protection solve CEO’s Concern?
Liquidity
Reduce Fixed cost
Increase Productivity
IT is focus on Core Business Processes
Total cost in security has decreased in 50%
No need for Security infrastructure InvestmentVariable Costs proportional to number of employees
IT has reduced time in Security related tasks from 3 hours per day to one
New Office and On-line Order System were ready as planned
Ensure business continuity
24x7 active security service which does not interfere in the day-to-day business STEVE BROWN
CEO
Case Study
27
How does Panda Cloud Protection solve Tim’s Concern?Improve Security & Risk Management
Reduce Fixed and Operational Costs
Focus on Business Needs
Maximum protection for endpoint, email and web trafficCentralized Security Management of the whole businessHQ, remote offices and road warriors with the same security policiesPeriodical Malware Audits for preventionWeb access controlBusiness is protected against new web threats (Web 2.0, rogueware)
No Investment in hardware and software for security in the new OfficeRecycling servers for new OfficeLess bandwidth & resource consumptionReduce installation time. Simply Install and Manage
No time in Server Maintenances, Updating/UpgradingLess Time in Security Management & cleaning infections
Reduce Email Server LoadLess email traffic on the networkEfficient anti-spam filtering
TIM
“THE IT GUY”
Case Study
28
SECURITY CONERNS
WHAT IS PANDA CLOUD PROTECTION?
¿HOW DOES IT WORK?
CLIENTS BENEFITS
FEATURES
INDEX
29
How Does It Work?
OFFICE 1
OFFICE 2
CLIENT 1
Instalation Option 1. Users receive an email with a link, and click on it to install.
Instalation Option 2. Push instalation with our distribution tool.
Instalation Option 3. You can also generation an inbstalation package and distribute it through login-script, Active Directory, Tivoli, SMS, LanDesk, etc
Transparent updates from nearest computers. Minimizes broadband consumption. 30
How Does It Work?
31
INTERNET
How Does It Work?
32
INTERNETCONFIDENTIAL
Real-time dashboard
Real-time transaction detail
Location, department or application view
Overall usage for Social Networks
Top applications for: guestSocial Networks used
Webmails sent and viewed
Webmail
Threats like Botnets and Malicious code
Transaction level details of threats for user : Admin
Internet usage by LocationTop Internet Users
Usage trend by department
Visibility into Web 2.0 Applications
“Simply Unbelievable! The information I could not get at all before, or it took days to pull it out of multiple massive logs, is instantly available across all my company locations, including
road warriors.”CISO, Financial Services Company
How Does It Work?
SECURITY CONERNS
WHAT IS PANDA CLOUD PROTECTION?
¿HOW DOES IT WORK?
CLIENTS BENEFITS
FEATURES
INDEX
34
Panda Cloud Protection Portfolio
PANDA CLOUD OFFICE PROTECTION
PANDA CLOUD OFFICE PROTECTION
completo conjunto de soluciones hosted para endpoint, e-mail y tráfico web
PANDA CLOUD PROTECTION
PANDA CLOUD EMAIL
PROTECTION
PANDA CLOUD INTERNET
PROTECTION
PANDA CLOUD OFFICE
PROTECTION
0
Complete SaaS security suite that protects all the threat entry points: endpoints, email and web traffic
PANDA CLOUD PROTECTION
35
PANDA CLOUD OFFICE PROTECTION
Proactive protection for PCs, laptops and servers. Personal Firewall with centralized or personal management. Protection for files, email, HTTP/FTP and instant messaging
Web Console accessible from anywhere, 24/7
Delegated Administration Management. Create groups and assign privileges
Detailed, Summarized and Executive Reports . On-demand and scheduled scanning; results can be monitored in real time
Peer-to-peer and automated Updates/Upgrades. Workstations and servers update or upgrade their protection from the nearest computer
Protection based on security profiles and groups
Flexible Installation. Can be done remotely from a single point or locally
Panda Cloud Protection
36
Panda Cloud Portfolio
PANDA CLOUD EMAIL PROTECTION
Perimetral Antivirus and Antispam. Connection filters, Filtering of Senders, Heuristic, Bayesian and content filters
Web Console accessible from anywhere, 24/7
Delegated Administration Management.
Email traffic activity reports
Guaranteed filter mode ensures effective spam filtering, optimizing bandwidth and company resources
Business, domain or user level security profiles and setting
Webmail service for four days. Email backup for 15 days
Email Notifier for local management
37
Panda Cloud Protection
PANDA CLOUD INTENET PROTECTION
Antivirus Web, anti-malware, Protection against Botnets, Phishing attacks, Cross Site Scripting and other advanced Web 2.0 attacks. Web access control
Administration web console available 24/7 from any location
Content inspection filtering of all Web traffic. Ensures that confidential data (sales policies, clients data, social security) does not leave the organization
Centralized global reports for all Web traffic in real-time
Dynamic URL filtering and granular control of Web2.0 applications and activity (control who can do what (view, post), when (time), where (sites)
Data Leak Prevention (DLP)
Optimize and control bandwidth
Ultra-low latency: Minimum redirection , insignificant latency
38
Technology partners
Why Panda Security?
39
Panda Security
40
THANK YOU!!!