Overview
Features
Support
Pricing & Add-ons
Overview
Features
Support
Pricing & Add-ons
 
 

SIMPLE, CENTRALIZED MANAGEMENT AND
SECURITY FOR ALL YOUR DEVICES

Fusion is a complete product able to protect, manage and deliver remote support to all your IT devices, including smartphones and tablets. As it is a cloud solution, it is deployed rapidly without the need for maintenance or costly investments in server infrastructure.

Accessible from anywhere and at any time, Fusion is managed from a simple browser, and offers:

  • Maximum protection against malware and other unknown threats.
  • Cost savings thanks to the automation of infrastructure management and centralized control.
  • The best support experience with proactive troubleshooting and remote, non-intrusive access to devices, no matter where they are.

Panda Fusion is a bundle of Endpoint Protection Plus and Systems Management:

MAXIMUM SECURITY

Protection for all devices inside and outside the office, 24 hours a day, 365 days a year, without the risk of data loss.

PROACTIVE SUPPORT AND MAINTENANCE

Rapid incident management and troubleshooting, with a minimal impact on users.

CENTRALIZED CONTROL AND MANAGEMENT

Permanent visibility of all hardware and software including workstations, servers, tablets, smartphones, printers and other components of the IT infrastructure.

100% CLOUD-BASED SOLUTION

  • Protects, manages and supports all devices –at any time and from anywhere- including those in remote offices and laptops.
  • No need for additional infrastructure on site.
  • Simple, central management via a Web browser.
  • Reduced resource usage: extremely light agent and reduced bandwidth usage when deploying software and automatically updating the protection.
  • Secure service with ISO 27001, SAS 70, PCI DSS and FISMA certifications.

SECURITY AND PROTECTION AGAINST MALWARE

  • Complete anti-malware protection for Windows, Linux, Android and Mac OS X workstations, as well as servers and laptops.
  • Maximum protection with real-time access to Collective Intelligence.
  • Heuristic and anti-exploit technologies against new threats that exploit unknown vulnerabilities and zero-day attacks.
  • Firewall (personal or managed).
  • Antivirus, anti-spam and content filter support for Microsoft Exchange 2007, 2010 and 2013.
  • Centralized device control (USB data storage devices, DVD/CDs, modems, Bluetooth devices, etc.).
  • Centralized quarantine management.
  • Category-based Web filtering and monitoring.
  • Remote data wiping and password protection for lost or stolen smartphones and tablets.
  • Advanced tools for rootkit and rogueware detection

REAL-TIME DEVICE INVENTORY AND MONITORING

  • Visibility and control of all devices on the network, including smartphones and tablets.
  • Control and monitoring of CPU usage, memory, disk space, services, software, etc.
  • Performance graphs and on-screen warnings.
  • Software and hardware change logs.
  • License management.

SOFTWARE AND UPDATES DEPLOYMENT (PATCH MANAGEMENT)

  • Discovery of unpatched devices and centralized, automatic patching of operating systems.
  • Centralized software installation.

REMOTE AUTOMATIC SUPPORT

  • Non-disruptive access: remote event logs, command line, task manager, file transfer, registry editor.
  • Remote desktop access: Shared access or complete control.
  • Messaging system for direct communication between users and the IT Department.
  • Ticketing system to organize and classify incidents, share troubleshooting procedures and documentation, etc
  • Script creation for automatic troubleshooting.
  • Quick task creation
  • Scalable platform, ability to integrate free components.

TECHNICAL REQUIREMENTS

Web Console

  • Internet connection
  • Internet Explorer 8.0 or later
  • Mozilla Firefox 3.0 or later
  • Google Chrome 2.0 or later

Internet connection

  • Operating systems (workstations): Windows 2000 Professional, Windows XP SP0 & SP1 (32 and 64-bits) XP SP2 and later, Vista, Windows 7, Windows 8.1 (32 and 64 bits) and Windows 10 (32 and 64 bits).
  • Operating systems (servers): Windows 2000 Server, Windows Home Server, Windows 2003 (32, 64 bits and R2) SP1 and greater, Windows 2008 32 and 64 bits, Windows 2008 R2 (64 bits), Windows Small Business Server 2011 and Windows Server 2012 (64 bit and R2).

For MAC workstations / file servers

  • Mac OS X 10.6 Snow leopard, Mac OS X 10.7 Lion, Mac OS X 10.8 Mountain Lion, Mac OS X 10.9 Mavericks, Mac OS X 10.10 Yosemite, Mac OS X 10.11 El Capitan.
    For Linux workstations / file servers
  • Fedora 19, 20, 21, 22, 23
  • Debian 7, 8
  • CentOS 6, 7
  • Ubuntu 12, 13, 14, 15, 16

For mobile devices

  • iOS 7 or later
  • Android 2.3.3 or later
  • For Exchange Server

  • Microsoft Exchange Server 2003, 2007, 2010 and 2013

Supports the following virtualization environments

  • VMWare ESX 3.x,4.x, 5,x
  • VMWare Workstation 6.0, 6.5, 7.x, 8.x and 9.x
  • Virtual PC 6.x
  • Microsoft Hyper -V Server 2008 R2 and 2012 3.0
  • Citrix XenDesktop 5.x, XenClient 4.x, XenServer and XenApp 5.x y 6.x

Certifications















Feature comparison table
Panda products incompatibility matrix
Fusion upgrade options
Product Characteristics
TRADITIONAL
PROTECTION
DEVICE
MANAGEMENT
PROTECTION
MANAGEMENT
PERIMETRAL
PROTECTION
ADVANCED
PROTECTION
Endpoint
Protection
Endpoint
Protection
Plus
Systems
Management
Fusion Email
Protection
Adaptive
Defense
Adaptive
Defense
360
Centralized cloud console
Anti-malware, anti-spyware and anti-phishing protection
Protection against zero-day exploits
Protection against unknown malware and targeted attacks
Monitoring and classification of 100% of running applications
Blocking of malware and applications being classified
Protection for vulnerable systems and applications
Email protection
Anti-spam protection
Exchange
Exchange
Advanced multi-layered spam protection (NDR, SPF, RBL, RPDS...)
Content-based email filtering
Exchange
Exchange
Advanced content-based email filtering using rules
Centralized email management
Email notifier on endpoints
Firewall
IDS / HIDS
Device Control
Web protection
URL filtering by category
Web browsing monitoring
Advanced disinfection and remediation tools
Centralized quarantine
Software and device inventory and audits
Agent and agentless device monitoring
Patch Management
Centralized software installation
Non-disruptive remote access
Remote desktop
Task automation and scripting
Component store
Ticketing / Help Desk / Chat
Incoming email backup
Real-time reporting and alerting
Advanced searches in reports
SIEM integration
Execution graphs for forensic analysis
Information on access to corporate data
High availability service
Optimized for virtual systems
Automatic updates
Windows compatible
Perimetral
Mac OS X compatible
Perimetral
Linux compatible
Perimetral
Android compatible
Perimetral
iOS compatible Perimetral
Microsoft Exchange
Perimetral
MDM support for Android and iOS smartphones and tablets
Security certifications
ISO27001,
SAS70
ISO27001,
SAS70
ISO27001,
FISMA, SAS70,
PCI DSS
ISO27001,
FISMA, SAS70,
PCI DSS
-
ISO27001,
SAS70
ISO27001,
SAS70




Support Options
Email Support: support@interworks.cloud
Support Details

All interworks.cloud services come with a FREE Standard Support plan via email to the address above or by directly submitting a ticket at our Support Portal, where you may also find our Live Chat support option (available weekdays, 08:00-22:00 GMT+2).

The out of the box FREE Standard Support plan for end-customers features the following:

Technical Support
Standard support plan Partner premium support Customer premium support Service definition
Available: 24/7
Best Effort
Available: 24/7
<30 min
Available: 24/7
<30 min
Critical
Customer’s business has significant loss or degradation of services, and requires immediate attention.
Available: business hours
<1 business day
Available: business hours
<1 hour
Available: business hours
<1 hour
Major
Customer’s business has moderate loss or degradation of services but work can reasonably continue in an impaired manner.
Available: business hours
<2 business days
Available: business hours
<30 min
Available: business hours
<4 hours
Minor
Customer’s business is functioning with minor impediments of services.
Learn more Learn more

Remember:

  • Should you use the Starter Support Plan, you can only make use of the features available in other support plans by upgrading to these.
  • A support plan is upgraded during the next business day.

Care to find out more about the different, exclusive interworks.cloud Support plans? Check out the various editions here that fit your needs, best.