logo

Select Sidearea

Populate the sidearea with useful widgets. It’s simple to add images, categories, latest post, social media icon links, tag clouds, and more.
hello@youremail.com
+1234567890
 

Panda Anti Virus – Fusion

SIMPLE, CENTRALIZED MANAGEMENT AND SECURITY FOR ALL YOUR DEVICES

Fusion is a complete product able to protect, manage and deliver remote support to all your IT devices, including smartphones and tablets. As it is a cloud solution, it is deployed rapidly without the need for maintenance or costly investments in server infrastructure.

Accessible from anywhere and at any time, Fusion is managed from a simple browser, and offers:

Maximum protection against malware and other unknown threats.

Cost savings thanks to the automation of infrastructure management and centralized control.

The best support experience with proactive troubleshooting and remote, non-intrusive access to devices, no matter where they are.

fusion-benefits

MAXIMUM SECURITY

Protection for all devices inside and outside the office, 24 hours a day, 365 days a year, without the risk of data loss.

PROACTIVE SUPPORT AND MAINTENANCE

Rapid incident management and troubleshooting, with a minimal impact on users.

CENTRALIZED CONTROL AND MANAGEMENT

Permanent visibility of all hardware and software including workstations, servers, tablets, smartphones, printers and other components of the IT infrastructure.

cloud-icon-fusion100% CLOUD-BASED SOLUTION

 

  • Protects, manages and supports all devices –at any time and from anywhere- including those in remote offices and laptops.
  • No need for additional infrastructure on site.
  • Simple, central management via a Web browser.
  • Reduced resource usage: extremely light agent and reduced bandwidth usage when deploying software and automatically updating the protection.
  • Secure service with ISO 27001, SAS 70, PCI DSS and FISMA certifications.

padlock-icon-fusionSECURITY AND PROTECTION AGAINST MALWARE

 

  • Complete anti-malware protection for Windows, Linux, Android and Mac OS X workstations, as well as servers and laptops.
  • Maximum protection with real-time access to Collective Intelligence.
  • Heuristic and anti-exploit technologies against new threats that exploit unknown vulnerabilities and zero-day attacks.
  • Firewall (personal or managed).
  • Antivirus, anti-spam and content filter support for Microsoft Exchange 2007, 2010 and 2013.
  • Centralized device control (USB data storage devices, DVD/CDs, modems, Bluetooth devices, etc.).
  • Centralized quarantine management.
  • Category-based Web filtering and monitoring.
  • Remote data wiping and password protection for lost or stolen smartphones and tablets.
  • Advanced tools for rootkit and rogueware detection

controls-icon-fusionREAL-TIME DEVICE INVENTORY AND MONITORING

  • Visibility and control of all devices on the network, including smartphones and tablets.
  • Control and monitoring of CPU usage, memory, disk space, services, software, etc.
  • Performance graphs and on-screen warnings.
  • Software and hardware change logs.
  • License management.

360-icon-fusionSOFTWARE AND UPDATES DEPLOYMENT (PATCH MANAGEMENT)

  • Discovery of unpatched devices and centralized, automatic patching of operating systems.
  • Centralized software installation.

monitor-icon-anti-virusREMOTE AUTOMATIC SUPPORT

 

  • Non-disruptive access: remote event logs, command line, task manager, file transfer, registry editor.
  • Remote desktop access: Shared access or complete control.
  • Messaging system for direct communication between users and the IT Department.
  • Ticketing system to organize and classify incidents, share troubleshooting procedures and documentation, etc.
  • Script creation for automatic troubleshooting.
  • Quick task creation.
  • Scalable platform, ability to integrate free components.

TECHNICAL REQUIREMENTS

Web Console

– Internet connection
– Internet Explorer 8.0 or later
– Mozilla Firefox 3.0 or later
– Google Chrome 2.0 or later

Internet connection

– Operating systems (workstations): Windows XP SP2 and later (Vista, 7, 8 & 10).
– Operating systems (servers): Windows Server 2003 SP2 and later (2008, 2012 & 2016)

For MAC workstations / file servers

– Mac OS X 10.6 Snow leopard, Mac OS X 10.7 Lion, Mac OS X 10.8 Mountain Lion, Mac OS X 10.9 Mavericks, Mac OS X 10.10 Yosemite, Mac OS X 10.11 El Capitan.

For Linux workstations / file servers

– Fedora (versions 19, 20, 21), Debian (versions 7, 8), CentOS (versions 6, 7), Ubuntu (versions 12, 13, 14, 15).

For mobile devices

– iOS 7 and later
– Android 4.1 and later

For Exchange Server

– Microsoft Exchange Server 2003, 2007, 2010 and 2013

Supports the following virtualization environments

– VMWare ESX 3.x,4.x, 5,x
– VMWare Workstation 6.0, 6.5, 7.x, 8.x and 9.x
– Virtual PC 6.x
– Microsoft Hyper -V Server 2008 R2 and 2012 3.0
– Citrix XenDesktop 5.x, XenClient 4.x, XenServer and XenApp 5.x y 6.x

Certifications:

Top