Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 Panda Malware Radar Discovering hidden threats Technical Product Presentation Name Date.

Similar presentations


Presentation on theme: "1 Panda Malware Radar Discovering hidden threats Technical Product Presentation Name Date."— Presentation transcript:

1 1 Panda Malware Radar Discovering hidden threats Technical Product Presentation Name Date

2 2  Security Concerns  What is Malware Radar?  Collective Intelligence  Features  Functionalities  Architecture  How Does it Work?  Scanning Technologies  Minimum Requirements  Technical Benefits Table of Contents

3 3 Security Concerns Panda Malware Radar

4 4 Security Concerns

5 5 72% of organizations are infected with active malware Infection rates by security vendor Hidden malware increases exponentially Security Concerns

6 6 What is Malware Radar? Panda Malware Radar

7 7 Based on our Collective Intelligence approach, it transparently complements and helps maximize your protection against hidden threats, without additional installation or infrastructure requirements. What is Malware Radar? Malware Radar is the only automated audit which locates infection points that traditional security solutions fail to detect.

8 8 Collective Intelligence Panda Malware Radar

9 9 Unmatched Security Data Processing Daily Intelligence at Panda Research 4 MILLION PC Monitored 9 MILLIONUnique Malwares Processed 96 MILLION Processes Monitored 340 MILLION Correlations of malware Dedicated Research & Development team at PandaLabs monitor thousands of malware sites gathering 8 Terabytes of information 94.4% of all malware detected in 2007 was managed by Collective Intelligence automatically “It is a matter of survival for AV vendors, who increasingly are looking for ways to reinvent themselves as their product struggle to thwart new type of infections. Cloud-based, collective intelligence services are the next big thing for anti- malware. I expect that every AV vendor will need to embrace an approach like this if they expect to survive” Yankee Group Collective Intelligence

10 10 Antivirus Anti – spyware Additional Security Layer Antivirus Anti – spyware Heuristics Antivirus Anti – spyware Heuristics Behaviour analysis Antivirus Anti – spyware Heuristics Behaviour analysis Collective Intelligence

11 11 Features & Functionalities Panda Malware Radar

12 12  Maximized detection rate thanks to Collective Intelligence Technologies  Compatible with installed protections  No installation and no dedicated infrastructure required  Detailed audit reports  Transparent process for employees  Always up-to-date and using latest technologies (Hosted service) Features

13 13  Optional automated disinfection  Standardized distribution capability (Tivoli, SMS, etc) or Malware Radar Distribution Tool  Scan Quick (active malware) or Full (active and latent malware)  System vulnerabilities scanner features  Validates existing security software status Functionalities

14 14 Architecture Panda Malware Radar

15 15 Architecture

16 16 How Does it Work? Panda Malware Radar

17 17 How Does it Work? Enter credentials

18 18 Start new audit How Does it Work?

19 19 Enter audit name How Does it Work? FINANCIAL DEPARTMENT AUDIT

20 20 Select distribution method to deploy the analysis How Does it Work? FINANCIAL DEPARTMENT AUDIT

21 21 Configure the audit options “General Settings” How Does it Work? FINANCIAL DEPARTMENT AUDIT

22 22 Configure the audit options “Scan Settings” How Does it Work? FINANCIAL DEPARTMENT AUDIT

23 23 Configure the audit options “Exclusions” How Does it Work? FINANCIAL DEPARTMENT AUDIT

24 24 Malware Radar Distribution Tool How Does it Work?

25 25 Distribute by Domain, Computer Name or IP Range How Does it Work?

26 26 Configure Distribution Settings How Does it Work?

27 27 You can run the audit on isolated computers and import results manually How Does it Work?

28 28 Real-time monitoring of the audit in-progress How Does it Work? FINANCIAL DEPARTMENT AUDIT

29 29 View reports after the audit is finished How Does it Work? FINANCIAL DEPARTMENT AUDIT

30 30 “Online Executive Report” How Does it Work?

31 31 “Online Technical Report” How Does it Work?

32 32 “Online Technical Report” How Does it Work?

33 33 “Online Technical Report” Detail of Workstation How Does it Work?

34 34 Scanning Technologies Panda Malware Radar

35 35  Collective Intelligence  Genetic heuristic technologies  System’s heuristic technologies  Rootkit detection technologies  Signature detection of known malware  System vulnerability detection  Security protection status (installed, enabled, up-to-date) Scanning Technologies

36 36 Minimum Requirements Panda Malware Radar

37 37 Endpoints  Windows 95/98/Me/NT4 SP6/2000/XP/2003/Vista  RAM: 512 MB.  Hard disk free space: 100 MB.  Internet Explorer 5.5 or above. Distribution Tool  Windows 2000/XP/2003/Vista  RAM: 512 MB.  Hard disk free space: 100 MB.  Internet Explorer 5.5 or above. Minimum Requirements

38 38 Technical Benefits Panda Malware Radar

39 39  Executive report of the network audit  Technical report on each computer audited  Real-time monitoring of the audit progress  No impact on employees PC usage thanks to CPU throttle  No need to install & uninstall anything on the endpoints  Identifies hidden malware undetected by your installed protection  Control the effectiveness of security software installed  Automatic cleanup of all malware detected  Always up-to-date without upgrades / updates  No additional hardware requirements Technical Benefits

40 40 Revision 1.01 2008


Download ppt "1 Panda Malware Radar Discovering hidden threats Technical Product Presentation Name Date."

Similar presentations


Ads by Google