Pricing

Title Unit Price
Unit Price
€66,00
bookmark local_offer
Volume discounts
Quantity Discount Price
0 to 50 0,00 % €66,00
51 to 100 9,09 % €60,00
101 to 500 16,67 % €55,00
501 to 1000 28,03 % €47,50
1001 to 3000 40,91 % €39,00
3001 to 5000 53,03 % €31,00
5001 to 10000 62,12 % €25,00
> 10001 69,70 % €20,00

Overview



DO YOU THINK YOUR ORGANIZATION IS
PROTECTED AGAINST ZERO-DAY AND
TARGETED ATTACKS?

 

The malware and IT security panorama has undergone a major change in terms of volume and sophistication. There has been an exponential increase in the number of viruses in circulation (around 200,000 new viruses appear every day), and new techniques for penetrating defenses and hiding malware are allowing threats to remain on corporate networks for long periods.

At the same time, IT environments have become increasingly complex, making management more difficult and systems more vulnerable.

Yet traditional antivirus solutions are out of step with the reality. Their linear evolution continues to use outdated detection techniques based on signature files and heuristic algorithms. This means that the results are inaccurate, i.e., that malware can go undetected and false positives are generated.

This discrepancy has led to what has been dubbed the ‘window of opportunity for malware’: the time lapse between the appearance of a new virus and the release of the antidote by security companies. An increasing gap that is exploited by hackers to get viruses, ransomware, Trojans and other types of malware into corporate networks. Such increasingly common threats can encrypt confidential documents and demand a ransom, or simply collect sensitive data for industrial espionage.


 

Governments, banks and other large companies are bearing the brunt of attacks that traditional antivirus​  solutions are simply not detecting in time. Our Research Department has analyzed millions of virus samples and the best antivirus products on the market to reveal that 18 percent of malware is undetected in the first 24 hours after it is released, and even after three months, these traditional solutions are still unable to detect 2 percent of malware.

The solution to this situation is Adaptive Defense: a Panda Security service which can accurately classify every application running in your organization, only allowing legitimate programs to run.

To achieve this, we have been working for five years on a new security model based on three principles: continuous monitoring of applications on a company’s computers and servers, automatic classification using machine learning on our Big Data platform in the cloud, and finally, as an option, our technical experts analyze those applications that haven’t been classified automatically to be certain of the behavior of everything that is run on the company’s systems.


THE ONLY SOLUTION TO GUARANTEE THE SECURITY OF ALL RUNNING APPLICATIONS

COMPLETE AND ROBUST PROTECTION GUARANTEED

Panda Adaptive Defense offers two operational modes:

  • Standard mode allows all applications cataloged as goodware to be run, along with the applications that are yet to be cataloged by Panda Security and the automated systems.
  • Extended mode only allows the running of goodware. This is the ideal form of protection for companies with a ‘zerorisk’ approach to security.

FORENSIC INFORMATION

  • Execution event graphs give a clear view of all events caused by malware.
  • Get visual information through heat maps on the geographical source of malware connections, files created and much more.
  • Locate software with known vulnerabilities installed on your network.

COMPATIBLE WITH TRADITIONAL ANTIVIRUS SOLUTIONS

Adaptive Defense can coexist with traditional antivirus solutions, and take the role of a corporate tool capable of blocking all types of malware, including targeted and zeroday attacks that such traditional solutions are unable to detect.

PROTECTION FOR VULNERABLE OPERATING SYSTEMS AND APPLICATIONS

Systems such as Windows XP, which are no longer supported by the developer and are therefore unpatched and vulnerable, become easy prey for zero-day and new generation attacks.

Moreover, vulnerabilities in applications such as Java, Adobe, Microsoft Office and browsers are exploited by 90% of malware.

The vulnerability protection module in Adaptive Defense uses contextual and behavioral rules to ensure companies can work in a secure environment even if they have systems that are not updated.


 

CONTINUOUS INFORMATION ON NETWORK STATUS

  • Get immediate alerts the moment that malware is identified on the network, with a comprehensive report detailing the location, the computers infected, and the action taken by the malware.
  • Receive reports via email on the daily activity of the service.

SIEM AVAILABLE

Adaptive Defense integrates with SIEM solutions to provide detailed data on the activity of all applications run on your systems.

For clients without SIEM, Adaptive Defense includes its own system for storing and managing security events to analyze all the information collected in real-time.

100% MANAGED SERVICE

Forget about having to invest in technical personnel to deal with quarantine or suspicious files or disinfect and restore infected computers. Adaptive Defense classifies all applications automatically thanks to machine learning in our big data environments under the continuous supervision of PandaLabs’ experts.

TECHNICAL REQUIREMENTS

Web Console

  • Internet connection
  • Internet Explorer 7.0 or later
  • Firefox 3.0 or later
  • Google Chrome 2.0 or later

Agent

  • Operating systems (workstations): Windows XP SP2 and later (Vista, Windows 7, 8, 8.1 and 10)
  • Operating systems (servers): Windows 2003 Server, Windows 2008, Windows Server 2012
  • Internet connection (direct or through a proxy)

 
 



Features


Support


Support Options


Support Details

All interworks.cloud services come with a FREE Standard Support plan, to cover your possible troubleshooting and information needs and demands.

The out of the box FREE Standard Support plan for end-customers features the following:

Technical Support
Standard support plan Partner premium support Customer premium support Service definition
Available: 24/7
Best Effort
Available: 24/7
<30 min
Available: 24/7
<30 min
Critical
Customer’s business has significant loss or degradation of services, and requires immediate attention.
Available: business hours
<1 business day
Available: business hours
<1 hour
Available: business hours
<1 hour
Major
Customer’s business has moderate loss or degradation of services but work can reasonably continue in an impaired manner.
Available: business hours
<2 business days
Available: business hours
<30 min
Available: business hours
<4 hours
Minor
Customer’s business is functioning with minor impediments of services.

Remember:

  • Should you use the Starter Support Plan, you can only make use of the features available in other support plans by upgrading to these.
  • A support plan is upgraded during the next business day.

Care to find out more about the different, exclusive interworks.cloud Support plans? Check out the various editions here that fit your needs, best.