Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Applications
    • Applications
    • Cloud
    • Cybersecurity
    • IT Management
    • Networking

    REVIEW: Panda Managed Office Protection Service Reduces Endpoint Security Costs

    Written by

    Matthew Sarrel
    Published September 23, 2009
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      If you take security seriously, then you already know that every endpoint on (or off) your network needs to be running some kind of protection. Endpoint protection typically consists of at least anti-malware, (HIPS) host-based intrusion prevention and a software firewall–all managed and deployed by a dedicated management server.

      The overhead of installing and managing a central command and control server can be a burden depending on the size of the company and available resources. Many companies–particularly small to midsize companies–frequently find themselves trapped in the difficult position of needing a centrally managed solution without having the resources to install, configure, deploy and manage one.

      Enter Panda MOP (Managed Office Protection). This SAAS (software as a service) server and workstation anti-malware solution allows systems to be managed and protected from a central location, regardless of whether they are inside or outside the company network.

      Check out eWEEK Labs’ gallery of Panda Managed Office Protection here.

      This saves on the upfront cost of buying and installing a central management server and the ongoing cost of maintaining that server. Administrators can log into the Web-based management console from anywhere to deploy software agents, trigger anti-malware scans and push policy to clients.

      Panda MOP is a bit different from other SAAS offerings in that it also leverages true cloud-based functionality for analysis of suspicious files. Panda’s Collective Intelligence system, available in all Panda products, stores the vast majority of signatures in the cloud while deploying only the signatures of malware the client is likely to encounter to the client itself.

      Each client also reports malware prevalence back into the Collective Intelligence system. The client software provides definition- and heuristic-based protection for files, e-mail, HTTP/FTP downloads and instant messaging; a software firewall; and a HIPS.

      Panda MOP, which costs $35 per seat per year, is not truly competitive with Symantec’s, Trend Micro’s or McAffee’s business-focused endpoint protection products. On the bright side, it has a light footprint and is very easy to deploy and manage.

      To the Test

      I tested Panda MOP on three Windows XP Pro workstations and on one Windows Server 2003 Enterprise Edition system running in virtual machines on VMware Workstation 6.5 for Windows Vista.

      Installation and configuration were as easy as they should be with an endpoint security solution in the SAAS model. I browsed to the secure Website management portal and created protection profiles for groups and users. MOP can be deployed either by sending users a link to the install package or by downloading the distribution tool, building your own packages and deploying them however you want. Both ways worked in my tests, and with each the install package was pretty small–roughly 5MB.

      The client application itself runs quietly on the system tray. Users can click the panda bear icon and choose to run a quick scan, a full scan, an e-mail scan; view firewall status; update the software/definitions; or view help. Users have no additional control over the app–it is all managed from the management portal.

      For the most part, I had few problems with the actual client software–the most serious being that it occasionally failed to update on its own and required me to force an update. Updates are supposed to be a strong point of MOP: Workstations can be configured to update definitions through a peer-to-peer connection to another workstation on the same network or go out and get the update directly from Panda over the Internet.

      In my testing, this flexibility saved significant bandwidth and decreased the amount of time the workstation was involved in updating. I was easily able to configure update frequency and rules through the management console.

      The management interface is simple and straightforward, and can be found at https://managedprotection.pandasecurity.com. The home page shows licensing information and a status graph that lists detections and their sources. MOP has the ability to create multiple administrators (called users) with different privileges within the management console.

      Additional reporting is available but not terribly informative beyond reporting protection status and detection activity in a few customizable graphs or pie charts. This is one of the places where Panda MOP simply doesn’t compete with a more extensive centrally managed enterprise endpoint security solution. Overall reporting lacks depth, although the executive report shows some good, high-level info that can be read at a glance.

      From the Computers tab, I could list all the endpoints under management in a single list by groups, or I could search by name. It’s really easy to see which computers have protection turned on and signatures updated, and, by mousing over a computer name, I could obtain complete network information.

      Clicking the Computer name opens a page entitled “computer details” that is, in fact, a bit light on details. It merely informed me which types of protection were enabled on that computer without offering anything more granular, configurable or informative. The only other option on this tab is to add a computer to the blacklist–meaning that it will not have MOP installed on it and will not appear in the management console.

      During tests. I downloaded and attempted to install a test set of keyloggers, rogue applications, adware and spyware, Trojan horses and viruses. MOP did best with viruses (it blocked eight of eight) and Trojan horses (it blocked two or two).

      Performance was less stellar with keyloggers and adware. No keylogger was blocked or detected, and two of the two adware programs were downloaded, installed and run. (Surprisingly, InstantGet was not detected by MOP but blocked by IE 8.)

      I then scanned the endpoint and found one of the keyloggers, but had not been removed. I was disappointed that the infections were not reported via the Management Console in real time, although real-time alerts are possible via e-mail (configured through protection profiles and warnings).

      Matthew D. Sarrel is executive director of Sarrel Group, an IT test lab, editorial services and consulting company in New York.

      Matthew Sarrel
      Matthew Sarrel
      Matthew D. Sarrel, CISSP, is a network security, product development, and consultant based in New York City. He is also a technical writer.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.