Panda Fusion

Security, Management and Support from the Cloud
Category : IT Management
Industries : all industries

Overview
Features
Support
Pricing & Add-ons
Overview
Features
Support
Pricing & Add-ons
 
 

SIMPLE, CENTRALIZED MANAGEMENT AND
SECURITY FOR ALL YOUR DEVICES

Fusion is a complete product able to protect, manage and deliver remote support to all your IT devices, including smartphones and tablets. As it is a cloud solution, it is deployed rapidly without the need for maintenance or costly investments in server infrastructure.

Accessible from anywhere and at any time, Fusion is managed from a simple browser, and offers:

  • Maximum protection against malware and other unknown threats.
  • Cost savings thanks to the automation of infrastructure management and centralized control.
  • The best support experience with proactive troubleshooting and remote, non-intrusive access to devices, no matter where they are.

Panda Fusion is a bundle of Endpoint Protection Plus and Systems Management:

MAXIMUM SECURITY

Protection for all devices inside and outside the office, 24 hours a day, 365 days a year, without the risk of data loss.

PROACTIVE SUPPORT AND MAINTENANCE

Rapid incident management and troubleshooting, with a minimal impact on users.

CENTRALIZED CONTROL AND MANAGEMENT

Permanent visibility of all hardware and software including workstations, servers, tablets, smartphones, printers and other components of the IT infrastructure.

100% CLOUD-BASED SOLUTION

  • Protects, manages and supports all devices –at any time and from anywhere- including those in remote offices and laptops.
  • No need for additional infrastructure on site.
  • Simple, central management via a Web browser.
  • Reduced resource usage: extremely light agent and reduced bandwidth usage when deploying software and automatically updating the protection.
  • Secure service with ISO 27001, SAS 70, PCI DSS and FISMA certifications.

SECURITY AND PROTECTION AGAINST MALWARE

  • Complete anti-malware protection for Windows, Linux, Android and Mac OS X workstations, as well as servers and laptops.
  • Maximum protection with real-time access to Collective Intelligence.
  • Heuristic and anti-exploit technologies against new threats that exploit unknown vulnerabilities and zero-day attacks.
  • Firewall (personal or managed).
  • Antivirus, anti-spam and content filter support for Microsoft Exchange 2007, 2010 and 2013.
  • Centralized device control (USB data storage devices, DVD/CDs, modems, Bluetooth devices, etc.).
  • Centralized quarantine management.
  • Category-based Web filtering and monitoring.
  • Remote data wiping and password protection for lost or stolen smartphones and tablets.
  • Advanced tools for rootkit and rogueware detection

REAL-TIME DEVICE INVENTORY AND MONITORING

  • Visibility and control of all devices on the network, including smartphones and tablets.
  • Control and monitoring of CPU usage, memory, disk space, services, software, etc.
  • Performance graphs and on-screen warnings.
  • Software and hardware change logs.
  • License management.

SOFTWARE AND UPDATES DEPLOYMENT (PATCH MANAGEMENT)

  • Discovery of unpatched devices and centralized, automatic patching of operating systems.
  • Centralized software installation.

REMOTE AUTOMATIC SUPPORT

  • Non-disruptive access: remote event logs, command line, task manager, file transfer, registry editor.
  • Remote desktop access: Shared access or complete control.
  • Messaging system for direct communication between users and the IT Department.
  • Ticketing system to organize and classify incidents, share troubleshooting procedures and documentation, etc
  • Script creation for automatic troubleshooting.
  • Quick task creation
  • Scalable platform, ability to integrate free components.

TECHNICAL REQUIREMENTS

Web Console

  • Internet connection
  • Internet Explorer 8.0 or later
  • Mozilla Firefox 3.0 or later
  • Google Chrome 2.0 or later

Internet connection

  • Operating systems (workstations): Windows 2000 Professional, Windows XP SP0 & SP1 (32 and 64-bits) XP SP2 and later, Vista, Windows 7, Windows 8.1 (32 and 64 bits) and Windows 10 (32 and 64 bits).
  • Operating systems (servers): Windows 2000 Server, Windows Home Server, Windows 2003 (32, 64 bits and R2) SP1 and greater, Windows 2008 32 and 64 bits, Windows 2008 R2 (64 bits), Windows Small Business Server 2011 and Windows Server 2012 (64 bit and R2).

For MAC workstations / file servers

  • Mac OS X 10.6 Snow leopard, Mac OS X 10.7 Lion, Mac OS X 10.8 Mountain Lion, Mac OS X 10.9 Mavericks, Mac OS X 10.10 Yosemite, Mac OS X 10.11 El Capitan.
    For Linux workstations / file servers
  • Fedora 19, 20, 21, 22, 23
  • Debian 7, 8
  • CentOS 6, 7
  • Ubuntu 12, 13, 14, 15, 16

For mobile devices

  • iOS 7 or later
  • Android 2.3.3 or later
  • For Exchange Server

  • Microsoft Exchange Server 2003, 2007, 2010 and 2013

Supports the following virtualization environments

  • VMWare ESX 3.x,4.x, 5,x
  • VMWare Workstation 6.0, 6.5, 7.x, 8.x and 9.x
  • Virtual PC 6.x
  • Microsoft Hyper -V Server 2008 R2 and 2012 3.0
  • Citrix XenDesktop 5.x, XenClient 4.x, XenServer and XenApp 5.x y 6.x

Certifications












Select the solution that fits your business needs, to estimate the cost of your provisioned resources.
Calculate based on hourly usage to get a more accurate estimation.
      *Taxes not included
      Feature comparison table
      Panda products incompatibility matrix
      Fusion upgrade options
      Product Characteristics
      TRADITIONAL
      PROTECTION
      DEVICE
      MANAGEMENT
      PROTECTION
      MANAGEMENT
      PERIMETRAL
      PROTECTION
      ADVANCED
      PROTECTION
      Endpoint
      Protection
      Endpoint
      Protection
      Plus
      Systems
      Management
      Fusion Email
      Protection
      Adaptive
      Defense
      Adaptive
      Defense
      360
      Centralized cloud console
      Anti-malware, anti-spyware and anti-phishing protection
      Protection against zero-day exploits
      Protection against unknown malware and targeted attacks
      Monitoring and classification of 100% of running applications
      Blocking of malware and applications being classified
      Protection for vulnerable systems and applications
      Email protection
      Anti-spam protection
      Exchange
      Exchange
      Advanced multi-layered spam protection (NDR, SPF, RBL, RPDS...)
      Content-based email filtering
      Exchange
      Exchange
      Advanced content-based email filtering using rules
      Centralized email management
      Email notifier on endpoints
      Firewall
      IDS / HIDS
      Device Control
      Web protection
      URL filtering by category
      Web browsing monitoring
      Advanced disinfection and remediation tools
      Centralized quarantine
      Software and device inventory and audits
      Agent and agentless device monitoring
      Patch Management
      Centralized software installation
      Non-disruptive remote access
      Remote desktop
      Task automation and scripting
      Component store
      Ticketing / Help Desk / Chat
      Incoming email backup
      Real-time reporting and alerting
      Advanced searches in reports
      SIEM integration
      Execution graphs for forensic analysis
      Information on access to corporate data
      High availability service
      Optimized for virtual systems
      Automatic updates
      Windows compatible
      Perimetral
      Mac OS X compatible
      Perimetral
      Linux compatible
      Perimetral
      Android compatible
      Perimetral
      iOS compatible Perimetral
      Microsoft Exchange
      Perimetral
      MDM support for Android and iOS smartphones and tablets
      Security certifications
      ISO27001,
      SAS70
      ISO27001,
      SAS70
      ISO27001,
      FISMA, SAS70,
      PCI DSS
      ISO27001,
      FISMA, SAS70,
      PCI DSS
      -
      ISO27001,
      SAS70
      ISO27001,
      SAS70




      Support Options
      Email Support: support@interworks.cloud
      Support Details

       

      All Interworks Cloud Services come with a FREE Starter Support plan, to cover your possible troubleshooting and information needs and demands.

      The out of the box Starter Support plan for end-customers features:

      • Support: 8 hrs x 5 Days Support, 09:00-17:00 (GMT+2) Mon-Fri
      • Contact support via: Email or Website
      • Response Time: 1 business day
      • Monthly Support Tickets: 5
      • Online Ticket Summaries: 1

      Remember:

      • Should you use the Starter Support Plan, you can only make use of the features available in other support plans by upgrading to these.
      • A support plan is upgraded during the next business day.

      Care to find out more about the different, exclusive Interworks Support Plans? Check out the various editions in and Interworks Customer Support that fit your needs, best.