Panda Fusion 360
  
Panda Fusion 360
Panda Fusion 360 is a comprehensive solution that provides automated security with advanced protection options, centralized IT management and remote support for all workstations, laptops and servers on the corporate network, including mobile devices and tablets. 
 
As a cloud-based solution, it is instantly deployable without the need to purchase and maintain additional IT infrastructure. 
 
Panda Fusion 360 consists of two products. 
 
Advanced adaptive security provided by Panda Adaptive Defense 360, protecting against all types of cyber threats, and Panda Systems Management cloud-based integrated solution for managing and remotely supporting IT infrastructure. 
 
Panda Adaptive Defense 360 is a solution for preventing, detecting and automatically responding to any type of cyberattack on endpoints. Automates the processes of preventing, detecting, deterring and responding to any existing and future complex threats, unknown malware, ransomware, phishing, exploits and malware-free attacks inside and outside the corporate network. Combines a wide range of Endpoint Protection (EPP) technologies with automated EDR capabilities through two services managed by Panda Security Experts:  
  • Service 100% classification
  • Threat Hunting & Investigation service. 
Systems Management is a simple and affordable way to manage, control and support all devices in your organization, whether they are in or out of the office. Due to the ease of use due to preset settings, virtually no additional training is required. As a result, the company's IT infrastructure works exactly as planned. 
 
System Management benefits: 
  • Frees up the resources of the IT team to implement more important projects;
  • Allows you to solve problems proactively;
  • Facilitates new technology support and BYOD adoption. 
 
Features and benefits of Panda Fusion 360 
 
Traditional protection technologies: 
  • Personal or managed firewall. IDS;
  • Device control;
  • Protection against malware across all attack vectors;
  • Managed black / white lists. Collective mind;
  • Heuristic;
  • Web filtering;
  • Anti-spam and anti-phishing;
  • Anti-tampering;
  • Filtering email content;
  • Recovery and rollback. 
Prevention, detection and response technologies: 
  • EDR: Continuous monitoring of end points;
  • Prevention of unknown processes execution;
  • 100% classification service: a machine learning-based cloud service that classifies all processes (APT, ransomware, rootkits, etc.);
  • Cloud sandbox in real environments;
  • Behavioral analysis and detection of indicators of attack;
  • Automatic detection and response to exploits;
  • Managed Threat Hunting Service. 
Cloud centralized management 
  • Detection of not updated devices. Automatic patching and patch management;
  • Remote, centralized software implementation. Monitor CPU, memory, disk space, services, software, etc. ;
  • Mobile Device Management (MDM): Monitor the status of all mobile devices in an organization;
  • Management and control of licenses. Notifications and alerts. 
Real-time monitoring and inventory: 
  • Real-time visibility and control of all devices on the network, including smartphones and tablets;
  • Monitoring and control of CPU, memory and disk space, services, software, backups, etc.
  • Performance tables and detailed system status reports with quantitative indicators;
  • Hardware and software change log. 
Remote, automated support 
  • Remote connection to devices based on agents or without it (Telnet / SSH, HTTP, etc.);
  • Discreet support: remote event log, command line, task manager, file transfer, registry editor;
  • Ticket system. Troubleshooting and internal communications. Free access to ComStore;
  • Quick tasks, the ability to download and configure scripts for automated troubleshooting. 

If you have any questions about WatchGuard, please, write us at watchguard@bakotech.com