Tag Archives: Panda Security

Don’t Let Yourself Become the Next Equifax

Last month we wrote about the biggest hack of sensitive personal data in history. Equifax, the financial entity that manages data for more than 820 million consumers and more than 91 million businesses around the world, suffered a global attack by an organized group called the PastHole Hacking Team, affecting customer data not only from the United States, but also Canada and the United Kingdom.

Following the recent events, it has come to light that the massive hacking attack is not the only grievance that the company has suffered. As it turns out, there was also malware on the company’s website.

Ars Technica reports that a security analyst named Randy Abrams came to the site to check his credit information when he encountered a fake Adobe Flash installer, one of those pop-ups that abound on the internet and demand that you “click here”, only to redirect you to some malicious site full of internet junk.

The subsequent analysis revealed that the “promoted” malicious software is called Adware.Eorezo and is marked as malware by only three cybersecurity solutions in the world, including Panda Security, testament to the great effort that went into hiding the code so as to cause as much damage as possible.

Panda’s good performance against Adware.Eorezo coincides with the AV-Comparatives Business Security Report recognizing the Adaptive Defense 360 ​​smart cybersecurity solution. This platform would successfully prevent an organization from becoming the victim of an attack such as Equifax. In the words of the independent laboratory, “Panda Adaptive Defense 360 ​​is managed by a well-designed, clearly laid-out cloud-based console, which would be very straightforward for less-experienced administrators to use. This makes it particularly suitable for small businesses, while its EDR features will make it appealing to corporations. ”

Now, the question is, how did attackers manage to slip past the security barriers at Equifax, a site with troves of incredibly sensitive data? Things may have turned out differently with the right security solution. Only unlimited visibility and total real-time control of advanced threats can be effective in protecting the IT infrastructure.

The post Don’t Let Yourself Become the Next Equifax appeared first on Panda Security Mediacenter.

Read More

Debunking the Myths of the GDPR

The GDPR (General Data Protection Regulation) is a hot topic among experts in cybersecurity and privacy. For consumers, the GDPR will strengthen the protection of basic rights on the internet and give control of personal data back to the user. But what does this mean for companies?

As the date for its entry into force approaches, and having explained the most important changes the regulation will bring about, in this article we will have a look at some of the myths surrounding the GDPR.

Myth 1: “The GDPR only affects companies in the European Union”

This is far from being the truth. The GDPR rules will apply to all companies that offer goods or services to people from the EU, regardless of where their offices or servers are located. Therefore, the GDPR applies to all companies that process information from EU citizens, making this the first global data protection law. For example, if an EU citizen uses a US-based social network, makes an ecommerce transaction in Japan, or uses an Argentinian platform for vacation rentals, all those companies must comply with the GDPR.

Myth 2: “All security incidents must be reported within 72 hours”

This is one of the most widespread myths and has been accepted as a general rule, but there is some nuance to it. First, only personal data leaks need to be reported — it is not required in the case of security incidents or data breaches that do not involve personal data. This means that any breach that affects the confidentiality or integrity of personal information must be reported.

Moreover, the countdown for the 72 hour deadline does not start when the incident occurs, but rather when the company becomes aware that it has suffered a personal data breach. If for some reason it is not possible to report the breach to the authorities within this time period, the limit can be extended provided that the organization justifies the delay.

Myth 3: “All data must be encrypted in order to be in compliance with the GDPR”

This is false for several reasons. The GDPR requires that measures be implemented to provide an appropriate level of security, based on an assessment of the risk involved in any action that requires, for example, the processing or storage of personal data.

Although encryption is a recommended measure, it is not a must. Everything depends on the risks associated with not encrypting said personal data. Thus, in the case of sensitive data, such as patient medical information, the GDPR recommends encryption and other robust security measures, such as secure algorithms.

Panda Security Can Help Ease the Transition

These are just three of the myths shrouding a regulation that will mark a before and after in the protection of personal data. To help all types of companies adapt and comply with the GDPR, at Panda we have prepared the “Preparation Guide to the New European General Data Protection Regulation”. In this guide, we respond to major issues related to the GDPR: How does it affect my business? What obligations does this regulation bring about? What happens if I do not comply with these obligations?

With this whitepaper, and using tools included in our Adaptive Defense solution, Panda can help meet the requirements imposed by the new regulation. Although the law will not come into effect until 2018, it is vital to understand the implications of the GDPR and to implement a plan of action.

The post Debunking the Myths of the GDPR appeared first on Panda Security Mediacenter.

Read More

Building Resistant Companies

Ransomware is on the rise, and in recent years has become one of the biggest headaches for IT departments in both large and small organizations. With 90 million attacks worldwide in 2016, and more than 180 million attacks expected for 2017, the million-dollar question is: how do we face these attacks? At Panda Security and Deloitte EMEA, we have no doubt about the matter — corporations can protect themselves by building their resistance.

The right approach and continuous response capabilities

Our new aim is to face the challenge conjointly, both structurally and in terms of the methodologies used by Panda Security and Deloitte EMEA. Increasingly aware of traditional security solutions’ shortcomings, namely their inability to handle attacks that use advanced techniques, such as those that use non-malicious tools, we made the decision to be proactive and reinvent cybersecurity.

How will we do this? With an advanced solution based on situational analysis:

  • Attackers are now more efficient than ever before. While attackers are able to compromise systems in just minutes or hours, businesses often take months or even years to react.
  • They attack the endpoint because it is from there that they can access other targets, exfiltrate information, steal credentials, or deploy other attacks.
  • The lack of resources and competence at companies is evidences by the statistic that hardly 4% of security alerts are investigated.

And we will also be watching the challenges that our clients face:

  • The availability of ransomware-as-a-service
  • Negative economic and reputational side effects
  • Data and productivity loss
  • Data protection initiatives in light of the GDPR

The result? A cyberintelligence platform that categorizes and correlates all of the data obtained about cyberthreats to carry out Prevention, Deteciton, Response, and Remediation tasks, combined with attack area reduction services rendered by Adapted Defense.

Panda and Deloitte: an anti-ransomware alliance

Recent events have proven the strength of a security model that has the answers to client’s needs:

  • Deloitte EMEA, invulnerable to the latest security breaches: this past week, we’ve learned that unknown actors allegedly had access to Deloitte USA’s email for months, with no major setbacks. However, the European branch, protected by Adaptive Defense, was unaffected by the cyberattack.
  • The major ransomware attacks of the year: both the WannaCry ransomware, which affected more than 150 countries and carried with it losses reaching up to 4 billion dollars, and the subsequent Petya/GoldenEye attacks, never reached a single Adaptive Defense user who had lock mode activated.

Governments and large public and private companies are betting on this strategy, making Adaptive Defense the best-selling security solution in the history of Panda Security, with a global market share of over 22% in EDR solutions. Multinationals in all types of strategic sectors (financial, telecommunications, military, energy, etc.) rely on Panda Security to protect their systems with Adaptive Defense.

The post Building Resistant Companies appeared first on Panda Security Mediacenter.

Read More

Zeus is Still the Base of Many Current Trojans

In 2007, no one expected ZeuS to have such a brutal impact on the digital world. But two years later, Zbot, another of the names it is known by, became a milestone in the history of cybersecurity. With more than 3.6 million infected computers in 2009, ZeuS compromised more than 74,000 FTP accounts on such important networks as those of NASA, ABC, Oracle, Cisco, Amazon, and Bank of America. It also managed to steal and block information from the United States Department of Transportation, among other government agencies. Its impact was extreme, and the measures to combat it hard and complex. To this day, ZeuS is still posing a threat.

What is ZeuS and what does it do?

Zbot is a classic Trojan in many ways: its vector of infection usually goes through phishing methods or “drive-by download” techniques. Basically, the software, designed to infect Windows, was introduced to devices by voluntary but unintentional downloads, via infected pop-ups or email attachments. Once infected, the Trojan, according to its variant, acts in various ways. In general, ZeuS is famous for its use in the theft of credentials, passwords, and other sensitive information through different techniques: keylogging, form-grabbing, or even cryptolocking.

Among the vulnerabilities exploited by this Trojan are some failures in Microsoft ATL, different problems found in ActiveX controls, or vulnerabilities in functions controlled by JavaScript, among many others. At the time, Zbot was detected and identified in time to stop it in its tracks. However, this Trojan, supposedly created by Evgeniy Mikhailovich Bogachev, better known as “Slavik”, has been the source of a powerful toolkit that can be purchased on the black market. These tools offer various modules with which to design and create new malware.

The “Sons” of ZeuS

There are thousands of variants of Zbot. Some, like Gameover, or the slightly newer Atmos, have made their own place in the headlines. Sphinx, Floki Bot, and many more share in their core the same guidelines as ZeuS. However, they have managed to go unnoticed by many security measures. Gameover jeopardized a large section of the financial community, and Atmos, identified in 2015, targeted banks and the transactions they processed. The warning from experts is clear: ZeuS is still here, just going by new names and honing other “skills”. And it’s more dangerous than ever.

How can we protect ourselves?

The disastrous result of being infected with this Trojan (or rather its variants), can be mitigated or avoided. To do this, we must take several immediate precautions. In addition to using advanced cybersecurity tools capable of preventing this Trojan from reaching the corporate network, it is advisable to take into account other specific aspects:

  • Avoid autoplay with multimedia files, activate read-only mode, and avoid access between computers in the network if it is not essential.
  • When using the company network for collaborative work, it is recommended to use strict protection and password policies, limiting access and permissions.
  • Get rid of unnecessary services, taking special care to eliminate ancillary services.
  • Keeping all software up to date is also a sure way to reduce weaknesses.
  • If an infection is detected, isolate the device immediately
  • Eliminate other unnecessary connection paths, such as Bluetooth.
  • Configuring email to automatically block attachments that are typically vulnerable, such as .exe, .bat, .vbs, .pif or .scr, will close one more door to attacks.

With a little attention and training, ZeuS will become a minor and well-controlled threat.

The post Zeus is Still the Base of Many Current Trojans appeared first on Panda Security Mediacenter.

Read More

Zeus is Still the Base of Many Current Trojans

In 2007, no one expected ZeuS to have such a brutal impact on the digital world. But two years later, Zbot, another of the names it is known by, became a milestone in the history of cybersecurity. With more than 3.6 million infected computers in 2009, ZeuS compromised more than 74,000 FTP accounts on such important networks as those of NASA, ABC, Oracle, Cisco, Amazon, and Bank of America. It also managed to steal and block information from the United States Department of Transportation, among other government agencies. Its impact was extreme, and the measures to combat it hard and complex. To this day, ZeuS is still posing a threat.

What is ZeuS and what does it do?

Zbot is a classic Trojan in many ways: its vector of infection usually goes through phishing methods or “drive-by download” techniques. Basically, the software, designed to infect Windows, was introduced to devices by voluntary but unintentional downloads, via infected pop-ups or email attachments. Once infected, the Trojan, according to its variant, acts in various ways. In general, ZeuS is famous for its use in the theft of credentials, passwords, and other sensitive information through different techniques: keylogging, form-grabbing, or even cryptolocking.

Among the vulnerabilities exploited by this Trojan are some failures in Microsoft ATL, different problems found in ActiveX controls, or vulnerabilities in functions controlled by JavaScript, among many others. At the time, Zbot was detected and identified in time to stop it in its tracks. However, this Trojan, supposedly created by Evgeniy Mikhailovich Bogachev, better known as “Slavik”, has been the source of a powerful toolkit that can be purchased on the black market. These tools offer various modules with which to design and create new malware.

The “Sons” of ZeuS

There are thousands of variants of Zbot. Some, like Gameover, or the slightly newer Atmos, have made their own place in the headlines. Sphinx, Floki Bot, and many more share in their core the same guidelines as ZeuS. However, they have managed to go unnoticed by many security measures. Gameover jeopardized a large section of the financial community, and Atmos, identified in 2015, targeted banks and the transactions they processed. The warning from experts is clear: ZeuS is still here, just going by new names and honing other “skills”. And it’s more dangerous than ever.

How can we protect ourselves?

The disastrous result of being infected with this Trojan (or rather its variants), can be mitigated or avoided. To do this, we must take several immediate precautions. In addition to using advanced cybersecurity tools capable of preventing this Trojan from reaching the corporate network, it is advisable to take into account other specific aspects:

  • Avoid autoplay with multimedia files, activate read-only mode, and avoid access between computers in the network if it is not essential.
  • When using the company network for collaborative work, it is recommended to use strict protection and password policies, limiting access and permissions.
  • Get rid of unnecessary services, taking special care to eliminate ancillary services.
  • Keeping all software up to date is also a sure way to reduce weaknesses.
  • If an infection is detected, isolate the device immediately
  • Eliminate other unnecessary connection paths, such as Bluetooth.
  • Configuring email to automatically block attachments that are typically vulnerable, such as .exe, .bat, .vbs, .pif or .scr, will close one more door to attacks.

With a little attention and training, ZeuS will become a minor and well-controlled threat.

The post Zeus is Still the Base of Many Current Trojans appeared first on Panda Security Mediacenter.

Read More

Panda Security, leader in Gartner’s Peer Insights program

panda-adaptive-defense

We’ve been warning for some time now that traditional antivirus solutions are no longer effective against the newer threats. Targeted and zero-day attacks, as well as the dreaded malwareless threats, are a growing concern for businesses. And not only that, we have also emphasized time and again the importance of preventing the losses and reputational damage stemming from cyber-threats, and how the new protection model leveraged by Panda Adaptive Defense and Adaptive Defense 360 can help companies reinforce their IT security posture by classifying and monitoring all processes running on their network. Panda’s new security approach provides complete endpoint visibility and allows organizations to block security attacks and respond to them immediately, implementing more robust security measures to prevent further incidents. This is not just our opinion but the opinion of our customers as well, as shown by the fact that 96 percent of participants in IT software and services review platform Gartner Peer Insights are recommending Panda’s advanced cyber-security solutions to other companies.

But, what is Gartner Peer Insights?

Peer Insights is an online platform of ratings and reviews of IT software and services. The reviews are written and read by IT professionals and technology decision-makers like you.

The goal is to help IT leaders make more insightful purchase decisions and help technology providers improve their products by receiving objective unbiased feedback from their customers.

“A product taht is great on visibility and proactive protection even againts direct attack. During the POC and Implementation, everything was easy. Even until now, the support is excellent.” – IT Assistant Manager in the Education Industry.

In this regard, Adaptive Defense, Panda Security’s Endpoint Detection and Response (EDR) solution, is the best rated software and receives 28 percent of all reviews submitted by participants. The best-rated features of Panda’s software include its detection, attack containment, remediation and investigation capabilities.   Additionally, Adaptive Defense’s 100% Attestation Service and the fact that it is cloud-based provide great value for its total cost of ownership, allowing customers to save time and money.

Outstanding capabilities to detect attacks and malware that we never though could escape. This tool does everything we need it to do,and as long as it continues to help us save time, I will continue recommending it.- Responsible For Systems in the Government Industry. 

Panda’s EPP technologies, represented by Panda Endpoint Protection, are also highly rated in the reviews. The fact that the solution can be managed from a single, central Web-based console at any time, from anywhere, is highly praised by IT security professionals,

Companies of all sizes and industries say they have become more resilient to cyber-attacks and give Panda a 4.7 out of 5 overall rating, outscoring all other security vendors.

I’d like to participate in the program, but who can write a review?

Reviews must be completed by people working with Panda Endpoint Protection or Panda Adaptive Defense/Adaptive Defense 360 on a daily basis, or people involved in the purchasing decision.

Panda Adaptive Defense delivers on its commitment to provide complete, integrated protection to users, and is at the forefront of advanced cyber-security solutions. It’s not just us who say so.Are you using Panda Endpoint Protection, Panda Adaptive Defense or Panda Adaptive Defense 360 in your organization? Would you like to share your experience with your peers? Click here to access Gartner’s Peer Insights platform and share your cyber-security experience.

The post Panda Security, leader in Gartner’s Peer Insights program appeared first on Panda Security Mediacenter.

Read More

Panda Security and Deloitte Sign a Cyber Alliance against Advanced Threats

Even with security technology in place, companies know that it is not possible to prevent all cyberattacks. At any rate, however, the damages caused by attacks can be greatly mitigated with quick and decisive action in response to threats. The answer is to use a cybersecurity solution capable of monitoring, uninterruptedly, all applications in order to block known malware and detect other advanced and unknown malware.

With this goal in mind, Panda Security is signing a strategic Cyber Alliance with Deloitte to cover clients in Europe, the Middle East, Africa, and Latin America with global protection against advanced cyberthreats thanks to the Panda Adaptive Defense suite.

For further details of the Cyber Alliance, you can download the brochure here.

An alliance in the name of cybersecurity

This alliance between Panda Security and Deloitte will create an integrated security ecosystem that will maximize clients’ investment in their cybersecurity infrastructure. Deloitte’s offices in Spain will use the smart technology of Panda Adaptive Defense on 8,000 endpoints.

Traditional security solutions, while effective in protecting against known malware, are not capable of dealing with attacks where non-malicious tools and other advanced techniques are used. Only a solution like Adaptive Defense, which combines EDR (Endpoint Detection & Response) technology with monitoring and categorization of 100% of running processes, lowers the possibility of being attacked by advanced malware to zero.

“The agreement between Panda Security and Deloitte will provide our clients with the perfect combination of cybersecurity solutions and services to keep them protected from the rise of advanced cyberthreats,” said Juan Santamaría, General Manager of Panda Security, in a statement. “This cooperation will allow Deloitte’s most advanced security services to benefit from the smart cybersecurity technologies of Panda Security.”

With this agreement, Deloitte has gone one step further to become the leading global provider of advanced cybersecurity services for corporations. The collaboration allows the firm, which already has a team of over 1,200 IT security professionals in 20 EMEA countries, to combine functional business knowledge with a managed cybersecurity service like Adaptive Defense. Thanks to machine learning, Deloitte and its customers will be able to reduce to zero their possibility of becoming victims of a cyberthreat.

“This collaboration highlights the central role that these two companies play in the cybersecurity market, and specifically in the protection of digital infrastructures and the corporate network,” according to César Martin, Managing Partner in charge of Cyber Risk Advisory at Deloitte. “It will offer efficient protection against known and unknown threats to all clients in the Deloitte network and the EMEA region.”

Market recognition

The market, independent analysts, and customers already attest to the evolution from a traditional security model to the contextual intelligence offered by Panda Security. Deloitte, the leading cybersecurity consultancy, will provide advanced cybersecurity solutions to the corporate market with Panda bringing intelligent endpoint security technology to the table.

The post Panda Security and Deloitte Sign a Cyber Alliance against Advanced Threats appeared first on Panda Security Mediacenter.

Read More

Panda Security Achieves Highest Level of Protection in AV-Comparatives’ First Semester Report

The technologic efficiency of Panda Security’s solutions has once again earned top marks from the independent testing laboratory AV-Comparatives, in their first comprehensive evaluation of the year. The Spanish cybersecurity firm finds itself at the top of the heap with other world-class security solutions, having been placed in the highest certification tier, Advanced+, in this new edition of the Real-World Protection Test.

 

The 21 leading cybersecurity firms in the world included in the test have undergone, on an individual basis, a total of 1995 tests in the period from February to June 2017.

Testing in a real-world environment

Just as the nature of threats changes, evaluating solutions designed to counter these threats also changes. Techniques such as social engineering play a key role. Malware is increasingly focused on users — for example, tricking them into visiting infected web pages, installing malicious software, or opening emails with infected attachments. The perimeter is where the user is, so keeping it protected is probably the biggest challenge for security barriers. Also to be taken into consideration is the use of exploits as an infection vector, a method which remains extremely popular, as we saw with WannaCry. Because of this, AV-Comparatives focuses on using the same attacks that users face in the real world in order to evaluate the effectiveness of security solutions, so that users can then make an informed decision about who they’re going to trust to protect their most precious data.

It’s just as important for solutions to protect users from malicious programs as it is for them to correctly detect innocent programs. A solution that blocks good software from running could hinder the normal workflow of users’ computers. Obviously, the consequences are not quite as serious if a file from an unknown program is blocked erroneously, as opposed to a tremendously popular one. They solve this issue in the test by classifying programs according to their prevalence: “very low”, “low”, “medium”, and “high”. Solutions that fail in this section due to the number and severity of false positives given are automatically downgraded.

In this rigorous and dynamic testing environment, Panda Security’s solution achieved a 99.8% protection rate. “We are truly proud of Panda’s results in these tests, as we are harvesting the fruits of a years-long labor to create the most advanced protection technologies in the world,” commented Luis Corrons, Technical Director of PandaLabs. “Having a good detection rate for malware is very simple if you detect everything that moves, as Trend Micro does for example, which was downgraded because of the huge amount of false positives it turned out.”

“The same thing can be said,” continued Corrons, “if your solution achieves a low ratio of false positives: it’s as simple as not detecting anything at all. Only one of the solutions had 0 false positives — Adaware — but it is also the one that had the highest failure rate when it came to detecting malware.”

“If you somehow manage to have a lot of false positives and at the same time detect very little malware ­— as was the case with Microsoft, McAfee, and Symantec — that’s a different story altogether.”

“The trick is to find a balance. Out of the 21 tested solutions, only 4 gave no false positives within the low, medium or high range: Adaware, ESET, Kaspersky, and Panda. And the solution that detected the most malware was Panda, which places us at the forefront of global security solutions. ”

These favorable results, which Panda has been consistently getting over the past months, demonstrate once again the high security standards offered by Panda’s solutions.

The post Panda Security Achieves Highest Level of Protection in AV-Comparatives’ First Semester Report appeared first on Panda Security Mediacenter.

Read More

Petya Webinar: Yet Another Ransomware Outbreak

Last week, yet another large-scale ransomware attack struck more than 60 countries. This attack, dubbed Petya/GoldenEye, not only encrypted data files on thousands of computers around the world, but also the MBR of their hard disks. After being attacked, victims were fully blocked from accessing their system the next time they rebooted it.

It’s impossible to talk about this attack without mentioning its predecessor, the now-famous WannaCry attack, which affected hundreds of thousand computers last month and crippled companies and public institutions all over the world.

Every earthquake has its aftershocks, and if there’s one conclusion that this new attack can bring to bear, it’s this: more global cyberattacks are coming, and now is the time to prepare for them.

Remarkably, no Panda clients were affected by the GoldenEye/Petya attack. This is not because the attack did not target any of Panda’s clients, but rather that it was no match for the advanced technology of Adaptive Defense. In fact, Panda profiled the Petya payload as malicious one day before the first vendors began to detect it.

As cybercriminals develop new and creative ways to skirt around traditional security solutions, basic antivirus technologies are not going to be enough to protect businesses and individuals from future attacks. That’s because traditional antivirus solutions only detect what is already known to be “bad”, and lets everything else run unimpeded. How preventative can you really be when anything your antivirus does not detect is allowed to run?

Below, you can watch a recording of our webinar on the topic presented by Panda’s own Rui Lopes, Pre-Sales Manager at Panda USA. The webinar provides detailed information on how the attack developed, recommendations for preparing for future attacks, and how to adopt a truly preventative approach.

The post Petya Webinar: Yet Another Ransomware Outbreak appeared first on Panda Security Mediacenter.

Read More

Panda Security and Stormshield Announce a European Technology Alliance Against Cyber Threats

Panda Security, the Spanish multinational leader in endpoint security solutions, and Stormshield, the French leader in enterprise network protection, have announced the establishment of a European strategic alliance, combining their expertise to more efficiently secure companies’ IT infrastructures and environments and help them with their digital transformation. Through this strategic alliance, customers will have access to unique solutions designed to detect and mitigate both known and unknown threats to networks, workstations, and servers. This offer will give customers a comprehensive and unified visibility of threats.

The agreement offers users the best of Stormshield and Panda Security solutions to secure their IT infrastructures and workstations.

An innovative security solution

In addition to providing customers with a unified, 100% European solution that integrates the best of both network and endpoint security technology, this cooperation will enable the two partners to share their expertise and knowledge of different threats in order to significantly increase their customers’ level of protection. Notably, Stormshield will share its expertise in security for industrial networks and operational technology. In general, Panda Security and Stormshield will collaborate closely to deliver effective protection against known and unknown threats. This one-of-a-kind collaboration in Europe signals the central role these two European IT companies intend to play in the cybersecurity market, and more specifically in the area of digital infrastructure protection.

It delivers cybersecurity management needed to protect companies from data breaches that cost €3.7 million on average.

Juan Santamaria, General Manager for Panda Security commented, “The next-generation firewalls and UTM features offered by Stormshield Network Security effectively secure our customers’ networks, delivering the best price/performance ratio on the market. This solution offers a much-needed, comprehensive response for traditional, industrial, and cloud infrastructures.”

Matthieu Bonenfant, Marketing Director for Stormshield, stated, “Panda Security is uniquely positioned in the market for workstation protection and advanced cybersecurity solutions. With its Adaptive Defense solution, all of our customers – regardless of their size – benefit from next-generation security that is easy to deploy and maintain. This solution fits perfectly with the existing Stormshield Endpoint Security offer mainly dedicated to industrial, operational and sensitive environments. We are proud of this new alliance and how it underscores our commitment to propose a large-scale European solution for end-to-end security of our customers’ environments.”

(1) 2016 Ponemon Institute Cost of a Data Breach Study

Download here the Press Release

The post Panda Security and Stormshield Announce a European Technology Alliance Against Cyber Threats appeared first on Panda Security Mediacenter.

Read More