Panda Security Produkt Vergleich
Informationsbroschüren | PDF DC PDF DSGVO |
||
Centralized cloud console | |||
Anti-malware, anti-spyware and anti-phishing protection | |||
Protection against zero-day exploits | |||
Protection against unknown malware and targeted attacks | |||
Monitoring and classification of 100% of running applications | |||
Blocking of malware and applications being classified | |||
Protection for vulnerable systems and applications | |||
Email protection | |||
Anti-spam protection | |||
Content-based email filtering | |||
Firewall | |||
IDS / HIDS | |||
Device Control | |||
Web protection | |||
URL filtering by category | |||
Web browsing monitoring | |||
Advanced disinfection and remediation tools | |||
Centralized quarantine | |||
Remote desktop | |||
Real-time reporting and alerting | |||
Advanced searches in reports | |||
SIEM integration | |||
Execution graphs for forensic analysis | |||
Information on access to corporate data | |||
High availability service | |||
Optimized for virtual systems | |||
Automatic updates | |||
Windows compatible | |||
Mac OS X compatible | |||
Linux compatible | |||
Android compatible | |||
Microsoft Exchange | |||
Vereinfachung der Einhaltung der DSGVO |
Diese Seite enthällt Markenzeichen und Texte von verschiedenen Herstellern. Siehe auch Kundeninformationen Markenrecht und Texte von Erstverfassern.