Call a Specialist Today! 855-958-0756

Panda Fusion 360
Advanced Security, Management and Support from the Cloud


Panda Security is now a part of WatchGuard Technologies

Panda Security is now a part of WatchGuard Technologies, please visit our WatchGuard Technologies website to learn more about this product!

 

Overview:

Panda Fusion 360 is a holistic solution that provides automated advanced security, centralized IT management, and remote support for all workstations, laptops and servers on the corporate network, including mobile devices and tablets. As it is a cloud solution, it is deployed rapidly without the need for maintenance or costly investments in IT infrastructure.

Panda Fusion 360 combines the best of two worlds. The advanced adaptive security provided by Panda Adaptive Defense 360 against all types of cyberthreats, and the integrated management, monitoring and remote support capabilities delivered by Panda Systems Management.

  • Automated prevention, detection, containment and response against any present or future advanced threats, zero-day malware, ransomware, phishing, memory exploits and malwareless attacks.
  • Cost savings thanks to centralized control and automation of infrastructure management tasks.
  • The best support experience with proactive troubleshooting and remote, unobtrusive access to devices inside and outside the corporate network

Systems Management
Panda Systems Management

Mobility, processing and storage have revolutionized corporate environments, and organizations need tools that can help them improve efficiency and productivity. Panda Systems Management is a solution designed to manage, monitor and support all your organization’s devices, whether they are in the office or on the road.

Benefits


Improves IT management efficiency

  • Alerts and monitoring of corporate IT assets.
  • Granular visibility into all devices on your network.
  • Task automation and streamlined infrastructure management.
  • On-demand detailed reports with measurable results for decision makers and external authorities.
  • Incident management tool: greater collaboration and improved incident response times.

Increases productivity and reduces IT costs

  • Centralized management and support for all computers and devices, delivered from the cloud.
  • Network status monitoring helps create and apply software installation policies.
  • Unobtrusive support and remote access tools promote user mobility.
  • Continuous, real-time visibility into corporate assets (hardware and software inventory) simplifies audits and helps create business budgets.

Adaptive Defense 360
Panda Adaptive Defense 360

Panda Adaptive Defense 360 is a ground-breaking cybersecurity solution for workstations, laptops and servers, delivered from the cloud. It automates prevention, detection, containment and response against any present or future advanced threats, zero-day malware, ransomware, phishing, memory exploits and malwareless attacks, inside and outside the corporate network. It combines the widest range of endpoint protection technologies (EPP) with automated EDR capabilities, thanks to two services managed by Panda Security experts:

  • 100% Attestation Service

Benefits


Simplifies and minimizes the cost of advanced adaptive security

  • Its managed services reduce the cost of expert personnel. There are no false alarms to manage, and no responsibility is delegated to administrators.
  • Managed services self-learn from threats. No time is wasted with manual settings.
  • Maximum prevention on endpoints. Operating costs are reduced practically to zero.
  • There is no management infrastructure to install, configure or support.
  • Endpoint performance is not impacted as the solution is based on a lightweight agent and cloud architecture.

Automates and reduces response and investigation times

  • Automatic and transparent remediation.
  • Rapid endpoint activity recovery and immediate return to normal operation.
  • Actionable insights into attackers and their activity, speeding up forensic investigation.
  • Helps reduce the attack surface. Improves security posture and maturity.

Features:

Traditional Preventive Technologies
Traditional Preventive Technologies

  • Personal or managed firewall. IDS
  • Device control
  • Permanent, on-demand antimalware across multiple vectors
  • Managed blacklisting/whitelisting. Collective Intelligence
  • Pre-execution heuristics
  • Web filtering
  • Anti-spam and anti-phishing
  • Anti-tampering
  • Email content filtering
  • Remediation and rollback

Security and Protection Against Malware
Prevention, Detection and Response Technologies

  • EDR: Continuous endpoint monitoring
  • Unknown process execution prevention
  • 100% Attestation Service: cloud-based, machine learning behavior analysis service that classifies all processes (APTs, ransomware, rootkits, etc.)
  • Cloud-based sandboxing in real environments
  • Behavior analysis and IoA detection
  • Automatic detection and response to memory exploits

Cloud-based Centralized Management
Cloud-based Centralized Management

  • Detection of unpatched devices. Automatic patching and patch management.
  • Remote, centralized software deployment. Monitoring of CPU, memory and disk space usage, services, software, etc.
  • Mobile Device Management (MDM): monitoring of the status of all mobile devices across the organization.
  • License management and control. Dashboard alerts.

Real-Time Monitoring and Inventories
Real-Time Monitoring and Inventories

  • Real-time visibility and control of all devices on the network, including smartphones and tablets.
  • Monitoring and control of CPU, memory and disk space usage, services, software, backup execution, etc.
  • Performance charts and on-demand detailed status reports with measurable results.
  • Software and hardware change logs.

Remote Automatic Support
Remote, Automated Support

  • Remote connection to agent-based and agentless devices (Telnet/SSH, HTTP, etc.).
  • Unobtrusive support: remote event logging, command prompt, task manager, file transfer, registry editor.
  • Ticketing system. Troubleshooting and internal communication. Free access to the ComStore.
  • Quick jobs, ability to download and customize scripts for automated troubleshooting.

Benefits:

Ticket System For IT
Ticket System For IT

Fusion incorporates a ticket system to organize and classify user incidents and shared troubleshooting procedures.

Remote Control and Messaging
Remote Control and Messaging

Fusion allows you to remotely access the desktop of all users on the corporate network (shared access or total control), or communicate with them through a messaging system.

Profile-Based Configuration
Profile-Based Configuration

Assign different protection polices to users through configuration profiles.

Apply different levels of protection according to the profile of the user who connects to your corporate network.

Device Control
Device Control

Prevent malware entry and data leaks by blocking device categories: USB memory sticks and modems, webcams, DVD/CD drives, etc.

In addition, you can establish exceptions with device whitelists, or simply block certain dangerous actions (access, read, write) on protected devices.

Flexible and Rapid Installation
Flexible and Rapid Installation

Deploying Fusion across complex networks has never been easier.

Install the solution on your devices through an email with a download URL, or transparently by selecting each device in the built-in deployment tool (compatible with Active Directory, Tivoli, SMS, etc.).

Malware Freezer
Malware Freezer

Avoid false positives with Malware Freezer. Freeze the malware detected for seven days and, if it is a false alarm, automatically restore the file on the user's system.

Cloud Based Management Platform:Aether Platform

Aether’s cloud-based platform and management console, common for all of Panda’s endpoint solutions, provide optimized advanced and adaptive security management inside and outside the corporate network. Minimize complexity and maximize flexibility, granularity and scalability.

Achieve more in less time. Easy implementation

  • Deploy, install and configure the solution in minutes. Immediate value from day one.
  • A single lightweight agent for all products and platforms (Windows, Mac, Linux and Android).
  • Automatic discovery of unprotected endpoints. Remote installation.
  • Proprietary proxy and repository/cache technologies. Optimized communication even with endpoints without an Internet connection.

Simplified operations. Adapts to your organization

  • Intuitive Web console. Flexible, modular management that reduces the total cost of ownership.
  • Configures users with total or limited visibility and permissions. Action audit.
  • Group and endpoint-based security policies. Predefined and custom roles.
  • Hardware and software inventories and change log.

Easy scaling of security and management capabilities over time

  • No need for new infrastructure to deploy the modules. No deployment costs.
  • Real-time communication with endpoints from a single Web console.
  • Dashboards and indicators per module.

System Requirements:

Panda Fusion 360 is a bundle of the following products: Panda Adaptive Defense 360 and Panda Systems Management whereas Panda Fusion is a bundle of Panda Endpoint Protection Plus and Panda Systems Management.

System Requirements
Operating systems (Workstations)
  • Windows XP SP3
  • Windows Vista 32/64-bit
  • Windows 7 (32/64-bit)
  • Windows 8/8.1 (32/64-bit)
  • Windows 10 (32/64-bit)
Operating systems (Servers)
  • Windows Server 2003 (32 / 64 bits y R2) SP2 o superior
  • Windows 2008 & R2 (32 y 64 bits)
  • Windows Server 2012 (64 bits) & Windows Server 2012 R2 (64 bits)
  • Windows Server 2016 (64 bits)
  • Windows Server 2019
  • Windows Server Core 2008, 2008 R2, 2012 R2 y 2016
Prerequisite in PCSM
  • .Net Framework 4.0.3 or higher.
For macOS workstations / file servers*
  • Mac OS X 10.10 Yosemite
  • Mac OS X 10.11 El Capitan
  • Mac OS X 10.12 Sierra
  • Mac OS X 10.13 High Sierra
  • Mac OS X 10.14 Mojave
For Linux workstations / file servers**
  • Fedora 19, 20, 21, 22, 23 ***
  • Debian 7, 8
  • CentOS 7
  • Ubuntu LTS (Long-Term Support versions)
  • Red Hat Enterprise Linux 7 and later versions ***
For smartphones and tablets
  • iOS 7 and later
  • Android 4.0 and later
For Exchange Server
  • Microsoft Exchange Server 2003, 2007, 2010, 2013 and 2016
Supports the following virtualization environments
  • VMWare ESXi
  • VMWare Workstation
  • Virtual PC
  • Microsoft Hyper -V Server
  • Citrix XenDesktop, XenClient, XenServer and XenApp
Compatible browsers
  • Internet Explorer
  • Microsoft Edge
  • Chrome
  • Firefox

* The PCSM support is provided only on Sierra, High Sierra and Mojave versions.
** Panda Adaptive Defense 360/Panda Endpoint Protection Plus on Aether Platform only works in Ubuntu and Fedora. The PCSM agent may work with any Debian-based distribution but support is only provided for the ones listed.
*** For new installations of the PCSM Linux agent, you must pre-install the Mono runtime.

Compare:


Functionality
Functionality extended in other Panda endpoint solutions.
Full Functionality
Full functionality.
Functionality. Only in Aether-based solutions.
Functionality extended in other Panda endpoint solutions. Only in Aether-based solutions.
Full functionality. Only in Aether-based solutions.
Full functionality. Only in Aether-based solutions.

  Adaptive Defense 360 Adaptive Defense Endpoint Protection Endpoint Protection Plus Systems Management Fusion Fusion 360
Adaptive Defense 360 Adaptive Defense Endpoint Protection Endpoint Protection Plus Systems Management Fusion Fusion 360
Protection
Protection against known and zero-day malware Full Functionality Full Functionality Functionality Functionality   Functionality Full Functionality
Protection against known and zero-day ransomware Full Functionality Full Functionality Functionality Functionality   Functionality Full Functionality
Protection against known and zero-day exploits Full Functionality Full Functionality Functionality Functionality   Functionality Full Functionality
Anti-spyware, anti-phishing protection, etc. Full Functionality Full Functionality Full Functionality Full Functionality   Full Functionality Full Functionality
Protection for multiple attack vectors (Web, email, network, devices) Full Functionality Functionality Full Functionality Full Functionality   Full Functionality Full Functionality
Traditional protection with generic and optimized signatures Full Functionality Full Functionality Full Functionality Full Functionality   Full Functionality Full Functionality
Protection against Advanced Persistent Threats (APT) Full Functionality Full Functionality         Full Functionality
Managed service: Classification of 100% of applications before execution (1*) Full Functionality Full Functionality         Full Functionality
Managed service: Threat Hunting (2*) Full Functionality Full Functionality         Full Functionality
Queries to Panda’s cloud-based collective intelligence Full Functionality Full Functionality Full Functionality Full Functionality   Full Functionality Full Functionality
Behavioral blocking and IoA detection Full Functionality Full Functionality Functionality Functionality   Functionality Full Functionality
Personal and managed firewall Full Functionality   Full Functionality Full Functionality   Full Functionality Full Functionality
IDS / HIDS Full Functionality   Full Functionality Full Functionality   Full Functionality Full Functionality
Ability to block unknown and unwanted applications Full Functionality Full Functionality         Full Functionality
Device control Full Functionality   Full Functionality Full Functionality   Full Functionality Full Functionality
URL filtering by category (Web browsing monitoring) Full Functionality   Full Functionality     Full Functionality Full Functionality
Content, Virus and Spam filtering for Exchange Server Full Functionality   Full Functionality     Full Functionality Full Functionality
Built-in antivirus protection for Exchange Server Full Functionality   Full Functionality     Full Functionality Full Functionality
Built-in anti-spam protection for Exchange Server Full Functionality   Full Functionality     Full Functionality Full Functionality
Monitoring
Advanced endpoint security Full Functionality Full Functionality         Full Functionality
Cloud-based continuous monitoring of all process activity Full Functionality Full Functionality         Full Functionality
Data retention for one year for retrospective attack investigation Full Functionality Full Functionality         Full Functionality
Detection
Detection of compromised trusted applications Full Functionality Full Functionality         Full Functionality
Managed service: Classification of 100% of applications during and after execution (1*) Full Functionality Full Functionality         Full Functionality
Fully configurable and instant security risk alerts Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.   Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.
Containment
Real-time computer isolation from the cloud console Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.         Full functionality. Only in Aether-based solutions.
Response and remediation
Ability to roll back and remediate the actions committed by attackers Full Functionality Full Functionality Full Functionality Full Functionality   Full Functionality Full Functionality
Centralized quarantine Full Functionality Full Functionality Full Functionality Full Functionality   Full Functionality Full Functionality
Automatic analysis and disinfection Full Functionality Full Functionality Full Functionality Full Functionality   Full Functionality Full Functionality
Investigation
Managed service: Threat Hunting (2*) Full Functionality Full Functionality         Full Functionality
Incident graphs and lifecycle information available from the Web console Full Functionality Full Functionality         Full Functionality
Ability to export lifecycle information for local analysis Full Functionality Full Functionality         Full Functionality
Advanced Visualization Tool (add-on) Full Functionality Full Functionality         Full Functionality
Discovery and monitoring of unstructured personal data across endpoints (add-on) Full Functionality Full Functionality         Full Functionality
Attack surface reduction
Information about each computer's hardware and software components Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.   Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.
Information about the Microsoft updates installed on endpoints Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.   Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.
Real-time information about the status of all protections and communications Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.   Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.
Unattended, automatic updates Full Functionality Full Functionality Full Functionality Full Functionality   Full Functionality Full Functionality
Automatic discovery of unprotected endpoints Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.   Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.
Ability to immediately protect unprotected endpoints remotely Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.   Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.
Panda native proxy to support endpoints with no Internet connection Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.   Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.
Endpoint security management
Centralized cloud-based console Full Functionality Full Functionality Full Functionality Full Functionality Full Functionality Full Functionality Full Functionality
Settings inheritance between groups and endpoints Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.   Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.
Ability to configure and apply settings on a group basis Full Functionality Full Functionality Full Functionality Full Functionality   Full Functionality Full Functionality
Ability to configure and apply settings on a per-endpoint basis Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.   Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.
Real-time deployment of settings from the console to endpoints Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.   Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.
Security management based on endpoint views and dynamic filters Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.   Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.
Ability to schedule and perform tasks on endpoint views Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.   Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.
Ability to assign preconfigured roles to console users Full Functionality Full Functionality Full Functionality Full Functionality   Full Functionality Full Functionality
Ability to assign custom permissions to console users Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.   Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.
User activity auditing Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.   Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.
Installation via MSI packages, download URLs, and emails sent to end users Full Functionality Full Functionality Full Functionality Full Functionality   Full Functionality Full Functionality
On-demand and scheduled reports at different levels and with multiple granularity options Full Functionality Full Functionality Full Functionality Full Functionality   Full Functionality Full Functionality
Security KPIs and management dashboards Full Functionality Full Functionality Full Functionality Full Functionality   Full Functionality Full Functionality
System status reports at different levels and with multiple granularity options Full Functionality Full Functionality Full Functionality Full Functionality Full Functionality Full Functionality Full Functionality
Device inventory and audits         Full Functionality Full Functionality Full Functionality
Agent and agentless monitoring of devices         Full Functionality Full Functionality Full Functionality
Patch management         Full Functionality Full Functionality Full Functionality
Centralized software installation         Full Functionality Full Functionality Full Functionality
Non-disruptive remote access         Full Functionality Full Functionality Full Functionality
Remote Desktop         Full Functionality Full Functionality Full Functionality
Built-in chat         Full Functionality Full Functionality Full Functionality
Task automation and scripting         Full Functionality Full Functionality Full Functionality
Component store - ComStore         Full Functionality Full Functionality Full Functionality
Ticketing/Help Desk         Full Functionality Full Functionality Full Functionality
Modules
Panda Data Control integration Full Functionality Full Functionality         Full Functionality
Advanced Reporting Tool integration Full Functionality Full Functionality         Full Functionality
SIEM integration Full Functionality Full Functionality         Full Functionality
Panda Patch Management Full Functionality Full Functionality Full Functionality Full Functionality   Full Functionality Full Functionality
Panda Full Encryption inregration Full Functionality Full Functionality Full Functionality Full Functionality   Full Functionality Full Functionality
High availability service Full Functionality Full Functionality Full Functionality Full Functionality Full Functionality Full Functionality Full Functionality
Host platform certifications ISO27001, SAS 70 ISO27001, SAS 70 ISO27001, FISMA, SAS70, PCI DSS
Supported operating systems
Supports Windows Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.
Suppots Exchange Full Functionality   Full Functionality   Full Functionality Full Functionality Full Functionality
Supports macOS X Full Functionality   Full Functionality Full Functionality Full Functionality Full Functionality Full Functionality
Supports Linux Full Functionality   Full Functionality Full Functionality Full Functionality Full Functionality Full Functionality
Supports Android Full Functionality   Full Functionality Full Functionality Full Functionality Full Functionality Full Functionality
Supports iOS         Full Functionality Full Functionality Full Functionality
Support for virtual environments - persistent and non-persistent (VDI)** Full Functionality Full Functionality Full Functionality Full Functionality   Full Functionality Full Functionality

* Panda Fusion is a bundle of Panda Endpoint Protection Plus and Panda Systems Management. Panda Fusion 360 is the combination of Panda Systems Management and Panda Adaptive Defense 360 that are sold separately
** Compatible systems with the following types of virtual machines: VMWare Desktop, VMware Server, VMware ESX, VMware ESXi, Citrix XenDesktop, XenApp, XenServer, MS Virtual Desktop y MS Virtual Servers. Panda Adaptive Defense 360 & Panda Fusion 360 solutions are compatible with Citrix Virtual Apps, Citrix Desktops 1906 & Citrix Workspace App for Windows, Panda Securtity has been verified as Citrix Ready partner.
1* 100% Classification Service.
2* Threat Hunting and Investigation Service

Cleaner Monitor:

Do you think your network could be infected, even though your antivirus tells you otherwise?

This is an advanced disinfection tool that runs a complete scan based on Collective Intelligence or cloud scanning in order to eliminate malware that traditional antivirus products are unable to detect. The benefits of having 25 years' experience detecting and disinfecting malware have enabled us to develop a solution that can monitor all the scans on your network and eliminate any latest generation viruses detected, remotely and from a centralized point.

Cleaner Monitor

Latest Technology
Latest Technology
Includes the latest technologies, which are more aggressive than conventional antivirus solutions in detecting and disinfecting latest threats.

Automatic Reset
Automatic Reset
Cuts out the manual tasks of restoring infected systems, automatically undoing the changes made by malware to operating systems and restoring system policies.

Central Monitoring
Central Monitoring
Stores all scan and disinfection results in a single cloud-hosted repository for all computers on the network. Access it through a simple Web browser and get the information that you need.

Compatible Con:

  • Windows 8 (32 and 64-bit)
  • Windows 7 (32 and 64-bit)
  • Windows Vista (32 and 64-bit)
  • Windows XP SP2 or later (32 and 64-bit)
  • Windows 2000 Professional
  • Windows Server 2003 (32 and 64 bits)
  • Windows Server 2008
  • Windows Server 2008 R2
  • Windows Server 2012 (32 and 64 bits)

Documentation:

Download the Panda Fusion 360 Datasheet (.PDF)