Tag Archives: gartner

Panda Security named a Visionary in Gartner Magic Quadrant for Endpoint Protection Platforms

Panda Security was named a Visionary in the Gartner 2018 Magic Quadrant for Endpoint Protection Platforms1.

Panda Security as a Visionary

The report’s evaluation is based on their completeness of vision and their ability to execute.

According to Gartner, “Visionaries deliver in the leading-edge features — such as cloud management, managed features and services, enhanced detection or protection capabilities, and strong incident response workflows — that will be significant in the next generation of products, and will give buyers early access to improved security and management. Visionaries can affect the course of technological developments in the market, but they haven’t yet demonstrated consistent execution. Clients pick Visionaries for best-of-breed features.”

We feel that Gartner has recognized our products unique value proposition and encourage you to view a complimentary copy of the full report.

According to the report, “In the past 12 months, EPP solutions have continued on track to consume features from the EDR market, and some of the traditionally pure-play EDR vendors have continued to bolster their solutions with protection capabilities more often found in EPP. This trend of playing catch-up from two directions has resulted in a slew of vendors with similar capabilities and with little to differentiate themselves. Those that do differentiate do so with managed features backed by automation and human analysts; a focus on cloud-first management and reporting, and improving the operational side of IT with a focus on vulnerability protection and reporting; and, most importantly, pushing full-stack protection for EPP and EDR use cases to organizations of all sizes.”

Adaptive Defense is the only solution available on the market that offers the full protection of a traditional antivirus, white listing, and protection against advanced threats all in one.

As stated in the Gartner research report, “Predicts 2018: Security Solutions”2: “By 2019, 45% of enterprises will manage data loss by leveraging CASBs and using encryption and EDRM techniques.”

“Panda Security is honored to be recognized as a Visionary in Gartner’s Magic Quadrant for Endpoint Protection Platforms as we strive to keep our customers protected against malware and non-malware attacks and turn endpoint activity data into insights and actionable intelligence. We believe this recognition is a proof of our success in achieving our mission and we look forward to bringing new innovative solutions and services in the space of advanced threat prevention, detection, investigation and threat response to Panda Security’s and our Channel Partners’ portfolio.”

– Juan Santamaria Uriarte, CEO, Panda Security

Read a complimentary copy of the 2018 Magic Quadrant for Endpoint Protection Platform

Panda Security’s Cloud-Based Solution for Organizations

Panda Adaptive Defense 360 is Panda Security’s cloud-based solution that provides, in a single lightweight agent, the highest level of Endpoint preventive Protection, Detection and Response, reducing drastically the exposure surface to any kind of malware and non-malware attacks.

Its EDR capabilities are achieved thanks to the complete behavior visibility of all endpoints, users, files, processes, registries, memories and networks. On top of these EDR capabilities, Panda Adaptive Defense 360 provides two unique, out-of-the-box services:

  1. The 100% Attestation Service that provides the highest level of prevention ever, simply by allowing to run only those applications validated in real time by Panda without delegating the responsibility to administrators.
  2. And the Threat Hunting and Investigation Service that detects, contains and responds to any threats that were able to bypass other security controls.

All this takes place on Panda Adaptive Defense’s Cloud Platform that allows a seamless deployment and management on all endpoints inside and outside the network from a single console while reducing the total cost of setup and running.

According to Gartner in its research report, “Redefining Endpoint Protection for 2017 and 2018”3, “Organizations should pay particular attention to solutions that include managed services (or perhaps more accurately described as “managed features”) like threat hunting or file classification — those that reduce the administrative workload by automation and orchestration, and those that focus on lowering the knowledge and skills barrier through built-in contextualized threat hunting assistants, guided response tools and easy-to-understand-and-use user interfaces.”

Panda Security has been independently tested, with other EPP vendors, by AV-Comparatives with a consistent 100% detection rate during the last 6 months in a row.

1 Gartner, Magic Quadrant for Endpoint Protection Platforms, Ian McShane Eric Ouellet Avivah Litan Prateek Bhajanka, 24 January 2018.

2 Gartner, “Predicts 2018: Security Solutions”, Dale Gardner, Deborah Kish, Avivah Litan, Lawrence Pingree and Eric Ahlm, 15 November 2017.

3 Gartner, “Redefining Endpoint Protection for 2017 and 2018,” Ian McShane, Peter Firstbrook, Eric Ouellet, 29 September 2017.

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

The post Panda Security named a Visionary in Gartner Magic Quadrant for Endpoint Protection Platforms appeared first on Panda Security Mediacenter.

Read More

Panda Security and Deloitte Have Exciting Announcement for the Gartner Summit

Following the success of the Gartner Security & Risk Management Summit in the US, Panda Security will also be participating in the London conference held on 18-19 September 2017. The summit will address the major challenges facing IT security leaders today. Analysts, panellists, and presenters will offer proven practices, technologies and methods to help adjust to the digital transformation and managing the increase in cybersecurity risks.

Panda Security will discuss how to protect your business with Adaptive Defense, the new cybersecurity model. We will be at Booth #S24.

In addition to sharing experiences at stand S24, we will be giving a joint presentation in conjunction with Deloitte. Juan Santamaría, General Manager of Panda, and Edward Moore, Associate Director of Cybersecurity at Deloitte EMEA, will discuss the fundamentals of cyberdefense for companies. In a talk titled ‘From Incident Response to Continuous Response Management, Building Resilience in Organizations’, we will discuss how to avoid economic losses and reputational damages brought about by cyberattacks such as ransomware.  The session will be held on Tuesday 19 September, from 10:35-10:55 in the Solution Showcase Theatre on Level 1.

As 100% prevention is not possible, organizations must continually improve its detection and incident response capabilities to significantly reduce the probability of experiencing a damaging breach.

Learn from the directors of Panda Security and Deloitte EMEA how to maximise returns on your company’s investments using the latest resilience practices.

Adaptive Defense, the Common Link Between Deloitte and Panda Security

Businesses are currently facing unprecedented challenges as they process the large volumes and high speeds of modern digital interactions. With exponential increases in attacks originating from unknown threats (up more than 40% from last quarter alone), it’s logical to conclude that companies need to be doing more to reinforce their security and control. It’s for this reason that Panda Security and Deloitte EMEA have created a Cyber Alliance to provide an integrated, dynamic, and adaptive security ecosystem.

At the heart of this agreement is Adaptive Defense, a managed cybersecurity service based on continuous monitoring of all active processes, with automatic classification via artificial intelligence, and behaviour analysis by Security Operation Center experts. This ecosystem allows organization to become more resilient and reduces significantly the probability of experiencing a damaging breach.

You can see here further details on the joint Panda Security and Deloitte talk and add to your calendar for the Gartner Security & Risk Management Summit here.

The post Panda Security and Deloitte Have Exciting Announcement for the Gartner Summit appeared first on Panda Security Mediacenter.

Read More

Panda Security, leader in Gartner’s Peer Insights program


We’ve been warning for some time now that traditional antivirus solutions are no longer effective against the newer threats. Targeted and zero-day attacks, as well as the dreaded malwareless threats, are a growing concern for businesses. And not only that, we have also emphasized time and again the importance of preventing the losses and reputational damage stemming from cyber-threats, and how the new protection model leveraged by Panda Adaptive Defense and Adaptive Defense 360 can help companies reinforce their IT security posture by classifying and monitoring all processes running on their network. Panda’s new security approach provides complete endpoint visibility and allows organizations to block security attacks and respond to them immediately, implementing more robust security measures to prevent further incidents. This is not just our opinion but the opinion of our customers as well, as shown by the fact that 96 percent of participants in IT software and services review platform Gartner Peer Insights are recommending Panda’s advanced cyber-security solutions to other companies.

But, what is Gartner Peer Insights?

Peer Insights is an online platform of ratings and reviews of IT software and services. The reviews are written and read by IT professionals and technology decision-makers like you.

The goal is to help IT leaders make more insightful purchase decisions and help technology providers improve their products by receiving objective unbiased feedback from their customers.

“A product taht is great on visibility and proactive protection even againts direct attack. During the POC and Implementation, everything was easy. Even until now, the support is excellent.” – IT Assistant Manager in the Education Industry.

In this regard, Adaptive Defense, Panda Security’s Endpoint Detection and Response (EDR) solution, is the best rated software and receives 28 percent of all reviews submitted by participants. The best-rated features of Panda’s software include its detection, attack containment, remediation and investigation capabilities.   Additionally, Adaptive Defense’s 100% Attestation Service and the fact that it is cloud-based provide great value for its total cost of ownership, allowing customers to save time and money.

Outstanding capabilities to detect attacks and malware that we never though could escape. This tool does everything we need it to do,and as long as it continues to help us save time, I will continue recommending it.- Responsible For Systems in the Government Industry. 

Panda’s EPP technologies, represented by Panda Endpoint Protection, are also highly rated in the reviews. The fact that the solution can be managed from a single, central Web-based console at any time, from anywhere, is highly praised by IT security professionals,

Companies of all sizes and industries say they have become more resilient to cyber-attacks and give Panda a 4.7 out of 5 overall rating, outscoring all other security vendors.

I’d like to participate in the program, but who can write a review?

Reviews must be completed by people working with Panda Endpoint Protection or Panda Adaptive Defense/Adaptive Defense 360 on a daily basis, or people involved in the purchasing decision.

Panda Adaptive Defense delivers on its commitment to provide complete, integrated protection to users, and is at the forefront of advanced cyber-security solutions. It’s not just us who say so.Are you using Panda Endpoint Protection, Panda Adaptive Defense or Panda Adaptive Defense 360 in your organization? Would you like to share your experience with your peers? Click here to access Gartner’s Peer Insights platform and share your cyber-security experience.

The post Panda Security, leader in Gartner’s Peer Insights program appeared first on Panda Security Mediacenter.

Read More

EDR Solutions Trending in Corporate Cybersecurity

“You can’t protect everything equally…we have to find a way to control only what matters.” With these words, Earl Perkins, research vice president at Gartner, struck upon the main security challenge currently facing businesses and governments. The problem is, if you were to attempt to keep all entry points covered, you’d be spreading your security resources too thin. We must assume that it is not possible to block all entry vectors at the same time — cybercriminals will eventually find a loophole through which to enter the systems of organizations.

With this in mind, it is time for companies to change their mindset and, according to Perkins, “take the money you’re spending on prevention and begin to drive it more equitably to detection and response. The truth is that you won’t be able to stop every threat and you need to get over it.”

Detain, respond, and remediate

As Gartner puts it, the trend for the remainder of 2017 and 2018 will involve a more equal budget breakdown between prevention measures and those for detection, response and remediation. In particular, companies will invest a greater amount of economic resources in Endpoint Detection and Response (EDR) solutions that complement the already existing EPP (Endpoint Protection Platform) measures, filling in the gaps left by the latter approach.

The market for EDR-type solutions has been booming since 2016, when revenue doubled in comparison with 2015, from $238 million to over $500 million. Gartner expects annual growth of 45% by the year 2020, well above the estimated growth of the information security market in general during the same period (7%).

These figures are telling. For one thing, they reinforce the idea that the fight against cybercrime requires solutions that allow complete visibility of all endpoints and gather valuable data in order to discover, analyze and respond to complex attacks. To do this, IT teams will look for solutions that integrate features such as automatic alerts that list threats according to priority for analysis by security teams, combining in turn automatic defensive measures that are triggered instantly upon detecting an attack. Another key feature of a quality EDR solution is the inclusion of forensic information, with the ability to break down the attacker’s actions within the network for future analysis. This, in turn, will allow you to locate software with known vulnerabilities that is installed on your company’s network.

After implementing effective EDR solutions, as Gartner anticipates, the next goal will be to incorporate predictive capabilities that alert IT teams to unusual behavior patterns. Thanks to predictive tools, security teams have the ability detect threats that would ordinarily go unnoticed by traditional solutions. In this sense, the combination of Big Data with artificial intelligence helps to analyze and classify huge amounts of data to discern where the main risk factors lie before attackers can take advantage of those vulnerabilities.

The use of both technologies also allows for the use of predictive models based on the information extracted after having undergone a security breach. This sort of data is invaluable to security teams.

With the application of these technologies, the goal will be for our company to operate in a continuous response mode to any possible security incident, whether a traditional threat, a vulnerable application, or an advanced hacking attack. And this training will only be achieved by jointly implementing prevention solutions (traditional protection, firewall, data protection such as file encryption, etc.) and detection and response solutions (threat intelligence, forensic information, threat data correlation, etc.).

Adaptive Defense 360, the perfect combination of EPP and EDR

In a market that is geared towards striking a balance between investments in EPP and EDR, Adaptive Defense 360 ​​is optimally positioned. It is the first cybersecurity service to combine advanced protection technologies and detection and remediation capabilities, with the ability to classify 100% of processes running on a corporate network. It uses contextual intelligence to reveal patterns of malicious behavior by correlating all collected data (more than 1TB daily!) Adaptive Defense 360 ​​combines contextual logic with cyber-defense actions to anticipate threats and data breaches, protecting more than 160,000 companies worldwide.

The post EDR Solutions Trending in Corporate Cybersecurity appeared first on Panda Security Mediacenter.

Read More

Panda Security at Gartner Security and Risk Management Summit


Panda Security will be attending this year’s Gartner Security and Risk Management Summit. The event, organized by IT research and advisory company Gartner, will be held in National Harbor, Maryland, United States, from June 12 -15.

Panda Security will be at Booth #643, presenting the new corporate cyber-security paradigm based on Adaptive Defense.

The Spanish multinational, leader in the development of advanced cyber-security solutions, has maintained a strong relationship with Gartner for many years, holding the honor of being the only European endpoint security vendor included in the Gartner EDR Market Guide. “Panda’s participation in this event is a consequence of the company’s commitment to aligning our strategy with Gartner’s analyses, and getting closer to analysts, customers and partners in order to position Panda’s brand and the new cyber-security model represented by Adaptive Defense,” explained Iratxe Vázquez, Product Marketing Manager at Panda Security.

Today’s world requires a digital transformation of enterprises that turns ideas into something real, into new business models based on more complex and better protected IT environments. But, how to guide your organization to a secure digital business future?

The Summit in detail

With such hot topics in the agenda as cyber-threat management, risks and opportunities of the Internet of Things, or how to enable safer Cloud Computing, the event aims at presenting heads of corporate security with the best and most effective ways to address escalating risk exposure while giving organizations the freedom to innovate.

Josu Franco, Strategy & Technical Advisor at Panda Security, states the following with regard to one of the key topics to be discussed at the Summit, adaptive security architecture: “With the huge number of digital devices that people use today, there is no way that security administrators can monitor all executables run on the corporate network. Without the help of an advanced cyber-security solution adapted to this new reality, companies may feel overwhelmed by the number of devices to manage.”

Panda Security will be at Booth #643, presenting its new adaptive cyber-security model represented by Adaptive Defense, a solution based on the continuous monitoring of all processes run across all endpoints on the corporate network. An innovative approach that will have an important place in an event that will present the latest cyber-security strategies and tactics, through lectures given by security and risk management experts and interactive workshops where attendees will have the opportunity to share their experiences with some of the most important market analysts.

Visit us at one of the best cyber-security conferences in the world, and learn how to manage risks with the best tools! 


The post Panda Security at Gartner Security and Risk Management Summit appeared first on Panda Security Mediacenter.

Read More

How to Distribute Your Technology Budget

The new European General Data Protection Regulations came into effect on 25 May, although countries and institutions have a period of two years to prepare for their final implementation. Given this situation, and to comply with the requirements of the standard, one would hope for companies to increase their investment in computer security. However, the scenario turns out to be quite different, according to a recent report from Gartner, a technology consultancy.

The firm’s experts warn that security spending generally makes up for between 1 and 13% of the corporate budget for technology. The important thing, analysts say, is not the size of the budget designated to secure and protect systems, but how the budgets are used.

“Clients want to know if what they are spending on information security is equivalent to others in their industry, geography and size of business in order to evaluate whether they are practicing due diligence in security and related programs,” explained Rob McMillan, research director at Gartner.

However, these comparisons between companies or sector-averaged data are not much use, according to the analyst. “You could be spending at the same level as your peer group, but you could be spending on the wrong things and be extremely vulnerable,” he warned.

According to the Gartner study, most companies continue to misuse and misinterpret IT spending figures with projections spanning over at least the next four fiscal years.

The consultancy indicates some guidelines for companies in their allocations of future budgets. The goal is to optimize the returns on their investment, which must meet the costs of hardware, software, services (such as consulting and auditing) and personnel.

To identify actual security costs, you must consider the equipment that security solutions integrates, updates, cybersecurity solutions, and other programs and applications, outsourced services, tools to ensure privacy, and training for employees.

According to the consultancy, it is not necessary to allocate large sums of money to implement measures to ensure the security of corporate systems and data. It would be enough if the expenditure involves between 4 and 7% of the technology budget, depending on how sensitive the information the company handles and the type of systems it already uses.

The post How to Distribute Your Technology Budget appeared first on Panda Security Mediacenter.

Read More