WatchGuard

For over 20 years, WatchGuard has pioneered cutting-edge cyber security technology and delivered it as easy-to-deploy and easy-to-manage solutions. With industry-leading network security, secure Wi-Fi, multi-factor authentication, and network intelligence products and services, WatchGuard enables more than 80,000 small and midsize enterprises from around the globe to protect their most important assets. In a world where the cyber security landscape is constantly evolving, and new threats emerge each day, WatchGuard makes enterprise-grade cyber security technology accessible for every company. WatchGuard is headquartered in Seattle, Washington, with offices throughout North America, Europe, Asia Pacific, and Latin America.

Award-winning, enterprise-grade protection for SMBs and distributed enterprises in one cost-effective, centrally managed solution. Keep imposters away from your networks and data with extended user verification that's easy to use and administer. WatchGuard’s Wi-Fi solutions provide the strongest protection from malicious attacks and rogue APs using patented WIPS technology.

Network Security (One Platform, Total Security) 

WatchGuard offers the most comprehensive portfolio of security services in the industry, from traditional intrusion prevention, gateway antivirus, application control, spam prevention, and URL filtering, to more advanced services for protecting against evolving malware, ransomware, and data breaches. Each security service is delivered as an integrated solution within an easy-to-manage and cost-effective Firebox appliance.
 
Total Security Services include Intrusion Prevention, URL Filtering, Gateway AntiVirus, Reputation-Based Threat Prevention, Spam Prevention, Application Control, Network Discovery, APT Blocker, Data Loss Prevention, Threat Detection and Response, IntelligentAV, Access Portal, DNSWatch. Learn more (https://www.watchguard.com/wgrd-products/security-services).
 
Network Security Products
 
Management of All Your Firebox Appliances
WatchGuard System Manager (WSM) is an out-of-the-box platform that enables you to centrally manage all the Firebox appliances in your network using one easy-to-use console. Whether you are managing security as an IT professional or a managed security service provider, leverage WSM monitoring and management tools to quickly apply configuration changes to your Firebox appliances in real time or as a scheduled task. (learn more https://www.watchguard.com/wgrd-products/network-security/management-wsm)


Reporting & Visibility - WatchGuard Dimension
WatchGuard Dimension™ is a cloud-ready network security visibility solution that comes standard with WatchGuard's flagship Unified Threat Management and Next Generation Firewall platform. It provides the big data visibility and reporting tools that uniquely identify and distill key network security threats, issues and trends, accelerating the ability to set meaningful security policies across the network. Use WatchGuard Dimension to monitor and gain critical and timely insights about network security, in real time, from anywhere and at any time, easily and quickly. (learn more https://www.watchguard.com/wgrd-products/watchguard-dimension)
 
Technology Partner Ecosystem
WatchGuard partners with industry-leading technology companies to develop integrations for stronger security, easier deployments, and better interoperability in your IT environments. From authentication products and service management platforms, to visibility solutions and Cloud services, WatchGuard has you covered, and we continually partner with new companies to offer the most desired and innovative integrations. (learn more https://www.watchguard.com/wgrd-partners/tech-partner-ecosystem)
 
Multi-Factor Authentication

Keep Criminals Outside Your Network with AuthPoint.
Our unique multi-factor authentication (MFA) solution not only helps to reduce the likelihood of network disruptions and data breaches arising from lost or stolen credentials, but we deliver this important capability entirely from the Cloud for easy set-up and management. AuthPoint goes beyond traditional 2-Factor Authentication (2FA) by considering innovative ways to positively identify users, and our large ecosystem of 3rd party integrations means that you can use MFA to protect access to the network, VPNs, and Cloud applications. Even non-technical users find the AuthPoint mobile app easy and convenient to use!
 
Ultimately, WatchGuard AuthPoint is the right solution at the right time to make MFA a reality for the businesses who desperately need it to block attacks.
 
AuthPoint Cloud Management
Until now, multi-factor authentication (MFA) has been out of reach for many due to the complex integrations and burdensome on-premises management, which makes it impossible to implement without a large IT staff and considerable up-front expense. By contrast, WatchGuard’s AuthPoint solution is a Cloud service, so there’s no expensive hardware to deploy, and you can engage with it from anywhere using WatchGuard Cloud’s intuitive interface to view reports and alerts, and configure and manage the service. (learn more https://www.watchguard.com/wgrd-products/authpoint/cloud-management)
 
AuthPoint Mobile App
AuthPoint implements multi-factor authentication (MFA) using the AuthPoint app. Any external login attempt creates a secure push notification to the user’s smartphone – showing who and from where someone is trying to authenticate. When this message is part of his/her own login process, they simply accept and quickly gain access to the authorized network resources and Cloud apps. When not, then the authorization attempt is rejected, causing criminals to be blocked from gaining access – even when they are using the correct credentials. (learn more https://www.watchguard.com/wgrd-products/authpoint/mobile-app)
 
Technology Partner Ecosystem - AuthPoint
WatchGuard’s technology ecosystem includes an extensive lineup of documented 3rd party integrations with AuthPoint, including the most popular cloud applications, web services, VPNs and networks. Ensure every point of access is protected with AuthPoint by leveraging its powerful technology ecosystem. (learn more https://www.watchguard.com/wgrd-partners/tech-partner-ecosystem/authpoint)
 
Secure Wi-Fi

A Trusted Wireless Environment is a framework for building a complete Wi-Fi network that is fast, easy to manage, and most importantly, secure. Businesses face the responsibility to build Trusted Wireless Environments protecting their employees and customers from hackers who easily exploit the weak or non-existent security of traditional Wi-Fi networks. With security and performance at the heart of our products, WatchGuard is the only company to provide the technology and solutions that you can use to build a Trusted Wireless Environment – delivering on each of the three core pillars of market-leading performance, scalable management, and verified comprehensive security. (learn more https://www.watchguard.com/wgrd-products/secure-wifi)
 
WatchGuard AP models

Endpoint Security
DNSWatchGO | RealWire RealResourceDNS-Level Protection for Users on the Go (DNSWatch-GO)

Whether working from a home office, coffee shop, or conference hotel room, the modern employee relishes the opportunity to be productive where they feel most comfortable. Today, three-quarters of global employees work remotely at least one day a week. As a result, more and more of your business is being conducted off-network, and outside of your traditional security tools. WatchGuard DNSWatchGO provides DNS-level protection and content filtering that keeps your business safe from phishing, ransomware, and other attacks even when your user is outside of the network, without requiring a VPN.

Key Features

  • DNS-level detection, providing an additional layer of security to block connections to the bad guys
  • Automatically protects end users from phishing attacks and C2 connections
  • Content filtering that limits access to risky areas of the web with 130 pre-defined blocking categories
  • Provides immediate security education to heighten end user awareness after an attack
  • Lightweight, always-on security
  • No VPN required

 Adaptive Defense 360 Improves on Traditional AV with EDR Technology

Designed for maximum protection with minimal complexity, the company’s flagship product, Adaptive Defense 360 (AD360), is designed and simply packaged to take the guesswork out of endpoint security.

Traditional AV Adaptive Defense 360
Based on signature files Based on behavior intelligence (Big Data + Machine Learning)
Only detects known malware Protects against all threat types including known and unknown malware, APTs, fileless attacks and any other malicious behavior it detects
Only sends alerts about the things that it knows to be bad Managed service that continously monitors, logs, and categorizes 100% of running processes even if they are initally deemed trustable
Basic protection Prevention, detection, and remediation
Offers no information about the attack Detailed forensic information, security audit and real time alerts
It works when malware gets into the endpoint, but doesn't monitor process activity Comprehensive visibility into all endpoint activity

Panda Adaptive Defense 360 (AD360)

Strong defenses with proactive intelligence, Adaptive Defense 360 brings Endpoint Detection and Response (EDR) capabilities together with a wide range of advanced endpoint protection (EPP) technologies and features our unique Zero-Trust Application and Threat Hunting Services.

Zero-Trust Application Service

Allows the execution of only those programs certified as “good.” It uses a combination of local technologies on the user's computer and a Cloud-hosted artificial intelligence (AI) system that utilizes big data infrastructure.

Threat Hunting Service

Adds another layer of analysis and investigation to detect attackers using “living-off-the-land” techniques. This service is operated by our cybersecurity experts to accurately provide our customers with the utmost clarity on detected threats and recommended responses.

Endpoint Antivirus

Panda Endpoint Protection

This effective, Cloud-native security solution for desktops, laptops and servers centrally manages the security of endpoints, both inside and outside the corporate network. Our Endpoint Protection (EPP) technologies prevent infections by utilizing our Collective Intelligence, the consolidated and incremental knowledge repository of all applications, binaries and other files, both trusted and malicious. At the same time, it analyzes endpoint behaviors to detect and block both known and unknown malware, ransomware, trojans and phishing attacks, and our threat intelligence and machine-learning algorithms provide faster detection. The lightweight agent deployes easily, simplifying security management and increasing operational efficiency
 

Panda Endpoint Protection Plus

Endpoint Protection Plus is a complete security solution for endpoints against malware, ransomware and the latest threats, and anti-spam protection for Exchange servers. It covers all vectors: network (firewall), email, and external devices, and surpasses our Endpoint Protection product with added web and content filtering capabilities. It also scans Exchange servers for viruses, hacking tools, and potentially unwanted programs to block spam, malicious emails and scams, and increase user productivity and security.
 

Security Operations

Panda Advanced Reporting Tool

From Data to Actionable IT and Security Insights
Advanced Reporting Tool stores and correlates information from endpoints on processes executed and other contextual information. It is then presented in a way to draw informed conclusions about corporate IT and security intelligence.

Detailed visibility of every event run on your endpoints is represented to facilitate easy security decisions and fast reactions.
  • Security incidents: Aggregate information in a single pane of glass and keep threats controlled by determining their origin and applying security measures to prevent future attacks.
  • Access to critical and sensitive information: Manage access by implementing more restrictive access policies to sensitive business information.
  • Applications and network resource usage: Monitor, detect and correct misuse of corporate resources and employee behaviors that may have an impact on business.

Panda SIEM Feeder

Security Intelligence That Reaches Your Company’s SIEM System
SIEM Feeder provides a new source of critical and valuable information into your current SIEM tool. It collects and correlates all the processes run on endpoints, allowing organizations to turn massive volumes of data into useful information for decision making, and thus enriching the organization with the knowledge provided by Adaptive Defense.

Full integration with corporate SIEM systems adds detailed visibility and context of every process running on your endpoints, enabling a new data correlation to improve your protection capabilities

Panda Patch Management

Vulnerability Assessment and Patch Management
Patch Management is an easy-to-use solution for managing vulnerabilities in operating systems and third-party applications on Windows workstations and servers. It covers all the patch management processes including discovering, identifying, assessing, reporting, managing, deploying installations and remediating security risks.
  • Reduce the attack surface, contain and mitigate vulnerability exploitation attacks, while strengthening your organization’s prevention and containment capabilities.
  • Centralized and real-time visibility into the security status of software vulnerabilities, missing patches, updates and unsupported (EOL) software.
  • Audit, monitor and prioritize operating system and application updates.

Panda Full Encryption

Protect Data with Encryption
Panda Full Encryption is the first line of defense to protect your data in a simple and effective way. It is a full-volume encryption solution that strengthens security against unauthorized access using established authentication mechanisms. Data encryption minimizes data exposure and provides an additional layer of security and control to your organization.
  • Automatically encrypts and decrypts disks without impacting end users.
  • Centrally manages the recovery keys stored on our Cloud-based management platform.
  • Prevents loss, theft and unauthorized access to data.

Panda Systems Management

Remote Monitoring & Management (RMM)
Systems Management is the easy and affordable way to manage, monitor, maintain and support all your organization’s devices and IT systems, whether they are in the office or remote. Thanks to the pre-configured settings, the learning curve is practically non-existent, and it ensures that the organization’s IT infrastructure operates exactly according to plan.
  • 100% granular visibility of your devices for centralized and simple IT policy enforcement.
  • Asset management controls for IT.
  • Remotely and proactively solve problems without impacting users.

Panda Fusion

RMM & Anti-Malware
Fusion combines our Systems Management and Endpoint Protection Plus solutions to protect, manage and support all of your corporate devices. Our Cloud-delivered solution allows a rapid deployment without needing maintenance or costly investments in server infrastructure.
  • Maximum Security: Continuous protection for all endpoints inside and outside the office.
  • Proactive Support and Maintenance: Rapid incident management and troubleshooting.
  • Centralized Control and Management: Permanent visibility of all hardware, software and other IT infrastructure components.

Panda Fusion 360

RMM + Advanced Security (EPP & EDR)
Fusion 360 combines our Systems Management and Adaptive Defense 360 solutions to unify RMM with EPP and EDR capabilities. This holistic solution combines the best of two worlds to provide advanced endpoint security, centralized IT management, monitoring and remote support capabilities. Fusion 360 ensures the classification of 100% of the running processes on all your endpoints with our Zero-Trust and Threat Hunting services.
  • Advanced prevention, detection and response technologies against breaches
  • Automated processes for reduced response and investigation times
  • Cloud-based centralized management for devices and systems, with real-time monitoring, inventory and remote support.

WatchGuard Endpoint Security includes a wide range of extensible solutions to meet the protection needs of any organization. Our scalable platform is designed to easily extend your corporate endpoint security and add additional capabilities without hassle.