Panda Security
3:20

Panda Security lands Telef'onica contract

Panda Security has become the global provider of EDR protection at Telefónica’s for the next three years.

3:10

Panda Patch Management lowers risk of data breach

Panda Security has launched Panda Patch Management to manage vulnerabilities for systems as well as for hundreds of applications.

3:30
Mar 8, 2019

Crypto-jacking: A hidden cost for your company

Cyber criminals are using malware to hack into devices and use them to trawl the Web, consuming their resources to mine crypto-currencies.

2:20

Which endpoint detection and response approach is right for you?

EDR technology is invaluable, but there are different ways to approach it, says Panda's Jeremy Matthews.

3:10

Gartner recognises Panda Security

The company is recognised as a 2019 Gartner Peer Insights Customers' Choice for Endpoint Detection and Response Solutions.

3:10
Dec 3, 2018

Crypto-jacking is biggest security threat of 2018

Crypto-jacking was the primary threat to the security and performance of electronic devices throughout the first half of the year, says Panda Security.

3:00

Panda Security solution manages vulnerabilities

Panda Patch Management reinforces vital prevention capabilities, drastically reducing the attack surface on endpoints, the company says.

2:30
Sep 13, 2018

Panda Security presents Panda Dome

Panda Dome is able to detect attacks before they occur, an unprecedented revolution in the cyber security market, the company says.

3:20
Aug 1, 2018

Firms are not prioritising IOT device security

Managing and securing Internet of things devices is going to be a key challenge for organisations, say experts.

3:00

Data breaches vs ransomware: what's the difference?

New-generation endpoint technology both hardens protection and enables full visibility of endpoint processes, says Panda Security.

3:00

Cyber resilience unpacked at Panda summit

Panda Security's inaugural Security Summit, #PASS2018, took place in Madrid recently.

1:40

Endpoints the new frontier in security battle

Over half of successful cyber attacks are on endpoints, says Jeremy Matthews, Panda Security Africa.

Related topics