Panda Security
  • Home
  • /
  • Topics
  • /
  • Panda Security

Remote working, global power plays are shifting the threat landscape

Organisations need to focus on reducing the attack surface of their endpoints, says Panda Security.

Jun 2, 2020

Seven steps to secure, manage remote workers

Monitoring and managing computers and devices is now more important than ever, says Panda Security.

May 15, 2020

Panda Security launches Threat Insights Report 2020

 Implementing advanced tech capable of protecting against a multitude of threats, as well as having visibility and control of the network, is critical, says Jeremy Matthews, CEO of Panda Security Africa.

Apr 30, 2020

Cyber attack campaigns exploit COVID-19

Panda Security’s 100% attestation service has allowed researchers to identify and block malicious executables.

Apr 3, 2020

Overcome the challenges of protecting and managing a remote workforce with Panda Security

The Webinars will explore the challenges of protecting and managing a remote workforce.

Jan 24, 2020

Panda Security offers free cyber-risk assessments as it launches Webinar series on building cyber-resilience

In the new series, Panda will explore how EDR technologies can provide an additional layer of protection as part of a holistic cybersecurity strategy.


Panda Security presents EDR and beyond at Gartner IT Symposium/Xpo 2019

In addition to its extensible model, Panda will launch its enterprise-focused brand, Cytomic, aimed at maximising threat prevention and stopping cyber attacks, says Jeremy Matthews, regional manager of Panda Security.

Jun 24, 2019

iWay Africa Kenya partners with Panda Security

The strategic cyber alliance enables iWay Africa to offer a managed security service to clients using Panda’s next-generation EDR solution.


Panda Security lands Telef'onica contract

Panda Security has become the global provider of EDR protection at Telefónica’s for the next three years.


Panda Patch Management lowers risk of data breach

Panda Security has launched Panda Patch Management to manage vulnerabilities for systems as well as for hundreds of applications.

Mar 8, 2019

Crypto-jacking: A hidden cost for your company

Cyber criminals are using malware to hack into devices and use them to trawl the Web, consuming their resources to mine crypto-currencies.


Which endpoint detection and response approach is right for you?

EDR technology is invaluable, but there are different ways to approach it, says Panda's Jeremy Matthews.

Related topics