Categories:

#8

Panda Endpoint Protection is ranked #8 in the EDR Solutions product directory based on the latest available data collected by SelectHub. Compare the leaders with our In-Depth Report.

Panda Endpoint Protection Pricing

Based on our most recent analysis, Panda Endpoint Protection pricing starts at $35 (Monthly).

Price
$
$
$
$
$
i
Starting From
$34.50
Pricing Model
Monthly
Free Trial
Yes, Request for Free

Training Resources

Panda Endpoint Protection is supported with the following types of training:

Documentation
In Person
Live Online
Videos
Webinars

Support

The following support services are available for Panda Endpoint Protection:

Email
Phone
Chat
FAQ
Forum
Help Desk
Knowledge Base
Tickets
Training
24/7 Live Support

Panda Endpoint Protection Benefits and Insights

Why use Panda Endpoint Protection?

Key differentiators & advantages of Panda Endpoint Protection

  • Improves Productivity: Control all devices on the network, their performance, licenses and software to ensure seamless functioning and enhance productivity. Guards employees from security threats like bots or phishing and engaging in unproductive behaviors by regularly monitoring and filtering web traffic. 
  • Comprehensive Reporting: Automatically generate security intelligence, detect internal misuse of the corporate systems and identify unusual behavior and attacks through its advanced reporting tool. Its dashboards include preset alerts, key indicators and searches across different areas that include network resources and applications used, access to critical information and security incidents. 
  • Real-Time Data Security: Organizations can comply with data protection regulations, discover and protect data across the entire security lifecycle through its unstructured data control module. Prevents financial loss and reputational damage by controlling and blocking access to sensitive (IP) and personal (PII) information. 
  • Simplifies Management: Easy to maintain with no specific infrastructure requirements to host the solution. Offers various deployment methods and facilitates rapid migration from third-party solutions with automatic uninstallers for competitors’ products. 
  • Increases Email Protection: Advanced cloud-based scanning technologies shield emails against spam, malware and viruses with multi-layer protection. Panda Security servers deliver immediate security by performing online scans to filter threats from inbound and outbound email traffic. Webmail gives uninterrupted, secure email access to its users. 

Industry Expertise

Panda Security is an endpoint security and productivity solution that delivers its services to companies and home users. It serves over 7.5 million clients worldwide with its presence in more than 80 countries. It has been recognized as a 2019 Gartner peer insights customers’ choice for its EDR solutions.

Panda Endpoint Protection Reviews

Based on our most recent analysis, Panda Endpoint Protection reviews indicate a 'great' User Satisfaction Rating of 89% based on 147 user reviews from 5 recognized software review sites.

User satisfaction level icon: great

147 reviews

89%

of users would recommend this product

Synopsis of User Ratings and Reviews

Based on an aggregate of Panda Endpoint Protection reviews taken from the sources above, the following pros & cons have been curated by a SelectHub Market Analyst.

Pros

  • User-Friendly Interface: It has a user-friendly interface with intuitive options and configurations, as noted by over 80% of reviewers who mention ease of use.
  • Blocks Intrusive Applications: All the reviewers who specify applications state that it blocks intrusive applications.
  • In-Depth Reports: It provides detailed reports on file analysis, as observed by 100% of the users who refer to reports.
  • Remote Support: It offers automatic remote support for problem resolution, as noted by all the reviewers who specify remote support.

Cons

  • Minor Threats: It can’t handle minor threats properly, as stated by the users who mention threat detection.
  • Slow Performance: Over 50% of reviewers who note speed report that it is resource-intensive and can slow down devices’ performance.
  • False Errors: It can highlight false errors that affect work agility, as observed by all reviewers who refer to false errors.
  • Constant Updates: Around 40% of the users who specify updates report that it requires constant updates for effective threat detection.

Researcher's Summary:

Panda Security provides centralized and advanced endpoint device protection to home users and businesses of all sizes. Its real-time security solution offers complete protection that covers different vectors like firewall, email, web and external devices. Many reviewers have noted that it consumes a large number of system resources that can slow down devices’ performance. It can also distract users with false error detections and constant updates. However, Panda Security does offer a user-friendly solution that can block intrusive applications and provide remote support to its users.

Key Features

  • Advanced Endpoint Protection: Provides complete protection that covers all vectors like email, web, network and external devices. Offers cross-platform security that includes Windows systems, macOS, Linux, Android and virtual environments. Also, exchange servers can be protected with Panda Endpoint Protection Plus. Ensures a productive workforce by preventing spamming and unauthorized website browsing. 
  • Systems Management: Organisations can monitor, manage and maintain all devices in the office or a remote location with an integrated solution. Proactively resolves problems and lets the IT team concentrate on value-added projects. Enables creation and modification of scripts or easy downloads from ComStore. Provides graphs and alerts for CPU memory, usage and hard disks, printers and more. 
  • Panda Fusion: Remotely supports and protects IT infrastructure devices that include tablets and smartphones. Provides centralized control, proactive troubleshooting and non-intrusive access to remote devices. Panda Fusion 360 combines management, control and remote support for advanced protection of endpoints. 
  • Patch Management: Minimizes risks in operating systems and third-party applications and helps manage vulnerabilities with updates and patches. Gives aggregated and centralized visibility of the security status regarding patches, vulnerabilities and pending updates. Reduces the attack surface on workstations and Windows servers by strengthening threat prevention, containment and remediation capabilities. 
  • Full Encryption: Delivers advanced adaptive security solutions through a full encryption module, acting as the first line of defense to protect data. Encrypt and decrypt disks by leveraging a stable Microsoft technology solution, BitLocker. Businesses can centrally manage and control recovery keys stored on its management platform. 
  • Aether Platform: Manage all endpoint solutions centrally through an extensible and scalable Aether platform. Monitor and handle devices with customized reports, granular settings and filters through a single web console. It integrates endpoint protection, endpoint protection plus, adaptive defense and adaptive defense 360. 
  • Panda Adaptive Defense: Combines endpoint protection and endpoint detection and response with 100% attestation services through an adaptive defense security suite. A combination of these solutions can provide detailed visibility, classification of processes by machine learning and experts and forensic analysis by Panda Security and MSSP’s expert analytics. 

Limitations

User feedback indicates the following limitations of Panda Security, as of the time of this review:

  •  Can’t detect minor threats sometimes. 
  •  Device performance can become slow. 
  •  Detects false errors at times, affecting user productivity. 
  •  Constant updates are required for threat detection. 

Suite Support

mail_outlineEmail: Email support isn’t mentioned.
phonePhone: Phone support is not available.
schoolTraining: It provides training options that include articles, data sheets, whitepapers, videos, case studies, modules, FAQs, blogs and security forums.
local_offerTickets: Customers can submit a contact form on its technical support page for queries.
Your review has been submitted
and should be visible within 24 hours.
Your review

Rate the product