Panda Data Control

Panda Data Control

Uncontrolled access to your company's personal and sensitive data is an everyday security threat that may lead to serious financial loss and reputational damage. Panda Data Control assists organizations in discovering and protecting personal and sensitive data, both in real time and throughout its lifecycle on endpoints and servers. Optional module for Adaptive Defense

  • Panda Data Control 548 KB

    An overview of Panda Adaptive Defense 360 along with modules Advanced Reporting Tool, Data Control and Patch Management. Panda Product Portfolio feature matrix.

    21 Sep 2018

Product Categories

  1. Product Categories
    Compliance
    • Legislation and Standards
    Data Protection
    • Privacy
    Human Factors
    • Insider Threat
    Risk Management
    • Risk & Vulnerability Assessment
    • Threat Intelligence

Panda Security

Stand:
  • E180
  • Product Information
  • Images
  • Social Media
  • New Exhibitor
Panda Security are the leading European vendor of EDR systems, with 30 years of technological innovation leading to the most important advances in the world of cybersecurity. Panda Adaptive Defense 36...Panda Security are the leading European vendor of EDR systems, with 30 years of technological innovation leading to the most important advances in the world of cybersecurity. Panda Adaptive Defense 360 model is a reinvention of cybersecurity, enabling Panda Security clients to stay ahead of cybercriminals - Reinventing CybersecurityMore

View Company Profile

More products from this Company:

  • Panda Adaptive Defense 360

    Panda Adaptive Defense 360 is the first and only offering to combine Endpoint Protection (EPP) and Endpoint Detection & Response (EDR) capabilities in...

  • Panda Advanced Reporting Tool

    Panda Advanced Reporting Tool - From Data to Actionable IT and Security Insight IT departments are overwhelmed: The increase in the security data vol...

  • Panda Patch Management

    Panda Patch Management is a user-friendly solution for managing vulnerabilities of the operating systems and third-party applications on Windows works...

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.