Call a Specialist Today! 855-958-0756

Panda Endpoint Protection
Simple and Light Endpoint Security Solution


Panda Endpoint Protection


Panda Endpoint Protection, 1-10 Users, 1 Year
- Price per user

#B1COPA
Our Price: $33.11


Endpoint Protection protects all your endpoints from a centralized platform, including laptops, smartphones, and Windows, Mac and Linux computers and servers.


Panda Security Software
Panda Endpoint Protection
Panda Endpoint Protection, 11-25 Users, 1 Year
- Price per user
#B1COPB
Our Price: $30.47
Panda Endpoint Protection, 26-50 Users, 1 Year
- Price per user
#B1COPC
Our Price: $28.81

Click here to jump to more pricing!

Overview:

Manage the security of all the computers in your network without affecting performance and at the lowest possible cost of ownership

Panda Security presents its simple and light endpoint security solution. Endpoint Protection provides centralized and uninterrupted protection for all of your Windows, Mac and Linux workstations, including laptops and servers, in addition to the leading virtualization systems and Android devices.

Panda Security's Collective Intelligence technology protects all workstations and servers against threats and exploits that use unknown zero-day vulnerabilities in real time, without needing to install additional servers or IT infrastructures.

With Endpoint Protection, the protection is managed conveniently and easily from a single Web console, permitting centralized administration anytime and anywhere, without needing technical knowledge.

Keep any computer or device that connects to your company virus free

Endpoint Protection provides centralized protection for all of your Windows, Mac and Linux workstations, including laptops, smartphones and the leading virtualization systems.

Endpoint Protection Cloud

Why do I need an enterprise antivirus solution like Endpoint Protection?

Centralized management from the cloud
All operations are performed in the cloud. Therefore, the impact of the antivirus on system performance is virtually zero.

Windows, Linux, Mac OS X, AndroidCross-platform protection
Endpoint Protection protects all of your computers running Windows, Linux, Mac OS X, in addition to Android smartphones and tablets, against known and unknown (Zero-Day) threats.

Minimizes maintenance costs
Our antivirus solution does not require additional infrastructure in your offices, minimizing the investment needed.

Real-time monitoring
Remotely monitor, control and adjust the security level of all network devices.

Manage the security of all the computers in your network without affecting performance and at the lowest possible cost of ownership

Features:

Protection and disinfection

  • Proactive and real-time protection from the cloud thanks to Panda Security's Collective Intelligence.
  • Maximum malware detection, even for malware that exploits unknown (zero-day) vulnerabilities, regardless of the source of infection (email, USB memory sticks, Web, etc).

Ease to use, easy to maintain

  • Manage the security of all users from anywhere from the Web console.
  • Simple, automatic and/or remote installation.
  • Automatic or scheduled transparent updates to avoid any inconvenience to the user.

A level of security for each situation and environment

  • Profile-based security to adapt the protection to the specific needs of your users.
  • Centralized monitoring of the security status of all PCs, servers and laptops through comprehensive dashboards.
  • Device control to block entire peripheral device categories (USB drives and modems, webcams, DVD/CD, etc.) with whitelists and control of permitted actions (access, read, write).

Benefits:

Simple and Centralized Security for all Devices
Simple and Centralized Security for all Devices

Centralized management of security and product upgrades through a simple Web browser for all network workstations and servers. Manage your Windows, Linux, Mac OS X or Android protection from a single administration console.

Cleaner Monitor: Repair any Infected Computer
Cleaner Monitor: Repair any Infected Computer

Run the separate Cleaner Monitor tool remotely and repair workstations infected with advanced or non-conventional malware.

Real-Time Monitoring and Reports
Real-Time Monitoring and Reports

With Endpoint Protection you can carefully monitor the security of your corporate network.

Automatically generate easy to interpret reports and graphs or consult all of this data in real time thorough comprehensive dashboards.

Profile-Based Configuration
Profile-Based Configuration

Assign different protection policies to users through configuration profiles.

Apply different levels of protection according to the profile of the user that connects to your corporate network.

Device Control
Device Control

Avoid malware entry and data leaks by blocking device categories: USB memory sticks and modems, webcams, DVD/CD drives, etc.

In addition, you can establish exceptions with device whitelists, or simply block certain dangerous actions (access, read, write) on protected computers.

Flexible and Rapid Installation
Flexible and Rapid Installation

Deploying the antivirus across complex networks has never been easier.

You can use two methods to install the antivirus on all the endpoints on your network: via an email with a download URL or transparently with the Endpoint Protection deployment tool (compatible with Active Directory, Tivoli, SMS etc.).

Malware Freezer
Malware Freezer

With Malware Freezer you can avoid any false positives. Freeze the malware detected for seven days and if it is a false alarm, automatically restore the file on the user's system.

ISO 27001 and SAS 70 compliant. Guaranteed 24x7 availability
ISO 27001 and SAS 70 compliant. Guaranteed 24x7 availability

The solution is hosted on Microsoft Azure with complete data protection guaranteed. Our data centers are ISO 27001 and SAS 70 certified.

Technical Requirements:


Technical Requirements
Web Console
  • Internet connection
  • Internet Explorer
  • Firefox 3.0
  • Google Chrome
For Workstations and File Servers
  • At least one with an Internet connection.
  • Operating systems (workstations): Windows 2000 Professional, Windows XP SP0 & SP1 (32 and 64-bits) XP SP2 and later, Vista, Windows 7 & Windows 8.1 (32 and 64 bits).
  • Operating systems (servers): Windows 2000 Server, Windows Home Server, Windows 2003 (32, 64 bits and R2) SP1 and greater, Windows 2008 32 and 64 bits, Windows 2008 R2 (64 bits), Windows Small Business Server 2011, Windows Server 2012 (64 bit and R2).
For MAC Workstations / File Servers
  • Mac OS X 10.6 Snow leopard
  • Mac OS X 10.7 Lion
  • Mac OS X 10.8 Mountain Lion
  • Mac OS X 10.9 Mavericks
  • Mac OS X 10.10 Yosemite
For Linux Workstations / File Servers
  • Ubuntu 12 32/64 bits and later
  • Red Hat Enterprise Linux 6.0 64 bits and later
  • CentOS 6.0 64 bits and later
  • Debian 6.9 Squeeze and later
  • OpenSuse 12 32/64 bits and later
  • Suse Enterprise Server 11SP2 64 bits and later
For Android devices
  • Android (from 2.3)
Supported Virtualization Environments
  • VMWare ESX 3.x,4.x, 5,x
  • VMWare Workstation 6.0, 6.5, 7.x, 8.x and 9.x
  • Virtual PC 6.x
  • Microsoft Hyper-V Server 2008 R2 and 2012 3.0
  • Citrix XenDesktop 5.x, XenClient 4.x, XenServer and XenApp 5.x and 6.x

Compare:


Functionality
Functionality extended in other Panda endpoint solutions.
Full Functionality
Full functionality.
Functionality. Only in Aether-based solutions.
Functionality extended in other Panda endpoint solutions. Only in Aether-based solutions.
Full functionality. Only in Aether-based solutions.
Full functionality. Only in Aether-based solutions.

  Adaptive Defense 360 Adaptive Defense Endpoint Protection Endpoint Protection Plus Systems Management Fusion Fusion 360
Adaptive Defense 360 Adaptive Defense Endpoint Protection Endpoint Protection Plus Systems Management Fusion Fusion 360
Protection
Protection against known and zero-day malware Full Functionality Full Functionality Functionality Functionality   Functionality Full Functionality
Protection against known and zero-day ransomware Full Functionality Full Functionality Functionality Functionality   Functionality Full Functionality
Protection against known and zero-day exploits Full Functionality Full Functionality Functionality Functionality   Functionality Full Functionality
Anti-spyware, anti-phishing protection, etc. Full Functionality Full Functionality Full Functionality Full Functionality   Full Functionality Full Functionality
Protection for multiple attack vectors (Web, email, network, devices) Full Functionality Functionality Full Functionality Full Functionality   Full Functionality Full Functionality
Traditional protection with generic and optimized signatures Full Functionality Full Functionality Full Functionality Full Functionality   Full Functionality Full Functionality
Protection against Advanced Persistent Threats (APT) Full Functionality Full Functionality         Full Functionality
Managed service: Classification of 100% of applications before execution (1*) Full Functionality Full Functionality         Full Functionality
Managed service: Threat Hunting (2*) Full Functionality Full Functionality         Full Functionality
Queries to Panda’s cloud-based collective intelligence Full Functionality Full Functionality Full Functionality Full Functionality   Full Functionality Full Functionality
Behavioral blocking and IoA detection Full Functionality Full Functionality Functionality Functionality   Functionality Full Functionality
Personal and managed firewall Full Functionality   Full Functionality Full Functionality   Full Functionality Full Functionality
IDS / HIDS Full Functionality   Full Functionality Full Functionality   Full Functionality Full Functionality
Ability to block unknown and unwanted applications Full Functionality Full Functionality         Full Functionality
Device control Full Functionality   Full Functionality Full Functionality   Full Functionality Full Functionality
URL filtering by category (Web browsing monitoring) Full Functionality   Full Functionality     Full Functionality Full Functionality
Content, Virus and Spam filtering for Exchange Server Full Functionality   Full Functionality     Full Functionality Full Functionality
Built-in antivirus protection for Exchange Server Full Functionality   Full Functionality     Full Functionality Full Functionality
Built-in anti-spam protection for Exchange Server Full Functionality   Full Functionality     Full Functionality Full Functionality
Monitoring
Advanced endpoint security Full Functionality Full Functionality         Full Functionality
Cloud-based continuous monitoring of all process activity Full Functionality Full Functionality         Full Functionality
Data retention for one year for retrospective attack investigation Full Functionality Full Functionality         Full Functionality
Detection
Detection of compromised trusted applications Full Functionality Full Functionality         Full Functionality
Managed service: Classification of 100% of applications during and after execution (1*) Full Functionality Full Functionality         Full Functionality
Fully configurable and instant security risk alerts Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.   Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.
Containment
Real-time computer isolation from the cloud console Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.         Full functionality. Only in Aether-based solutions.
Response and remediation
Ability to roll back and remediate the actions committed by attackers Full Functionality Full Functionality Full Functionality Full Functionality   Full Functionality Full Functionality
Centralized quarantine Full Functionality Full Functionality Full Functionality Full Functionality   Full Functionality Full Functionality
Automatic analysis and disinfection Full Functionality Full Functionality Full Functionality Full Functionality   Full Functionality Full Functionality
Investigation
Managed service: Threat Hunting (2*) Full Functionality Full Functionality         Full Functionality
Incident graphs and lifecycle information available from the Web console Full Functionality Full Functionality         Full Functionality
Ability to export lifecycle information for local analysis Full Functionality Full Functionality         Full Functionality
Advanced Visualization Tool (add-on) Full Functionality Full Functionality         Full Functionality
Discovery and monitoring of unstructured personal data across endpoints (add-on) Full Functionality Full Functionality         Full Functionality
Attack surface reduction
Information about each computer's hardware and software components Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.   Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.
Information about the Microsoft updates installed on endpoints Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.   Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.
Real-time information about the status of all protections and communications Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.   Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.
Unattended, automatic updates Full Functionality Full Functionality Full Functionality Full Functionality   Full Functionality Full Functionality
Automatic discovery of unprotected endpoints Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.   Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.
Ability to immediately protect unprotected endpoints remotely Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.   Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.
Panda native proxy to support endpoints with no Internet connection Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.   Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.
Endpoint security management
Centralized cloud-based console Full Functionality Full Functionality Full Functionality Full Functionality Full Functionality Full Functionality Full Functionality
Settings inheritance between groups and endpoints Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.   Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.
Ability to configure and apply settings on a group basis Full Functionality Full Functionality Full Functionality Full Functionality   Full Functionality Full Functionality
Ability to configure and apply settings on a per-endpoint basis Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.   Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.
Real-time deployment of settings from the console to endpoints Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.   Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.
Security management based on endpoint views and dynamic filters Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.   Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.
Ability to schedule and perform tasks on endpoint views Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.   Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.
Ability to assign preconfigured roles to console users Full Functionality Full Functionality Full Functionality Full Functionality   Full Functionality Full Functionality
Ability to assign custom permissions to console users Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.   Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.
User activity auditing Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.   Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.
Installation via MSI packages, download URLs, and emails sent to end users Full Functionality Full Functionality Full Functionality Full Functionality   Full Functionality Full Functionality
On-demand and scheduled reports at different levels and with multiple granularity options Full Functionality Full Functionality Full Functionality Full Functionality   Full Functionality Full Functionality
Security KPIs and management dashboards Full Functionality Full Functionality Full Functionality Full Functionality   Full Functionality Full Functionality
System status reports at different levels and with multiple granularity options Full Functionality Full Functionality Full Functionality Full Functionality Full Functionality Full Functionality Full Functionality
Device inventory and audits         Full Functionality Full Functionality Full Functionality
Agent and agentless monitoring of devices         Full Functionality Full Functionality Full Functionality
Patch management         Full Functionality Full Functionality Full Functionality
Centralized software installation         Full Functionality Full Functionality Full Functionality
Non-disruptive remote access         Full Functionality Full Functionality Full Functionality
Remote Desktop         Full Functionality Full Functionality Full Functionality
Built-in chat         Full Functionality Full Functionality Full Functionality
Task automation and scripting         Full Functionality Full Functionality Full Functionality
Component store - ComStore         Full Functionality Full Functionality Full Functionality
Ticketing/Help Desk         Full Functionality Full Functionality Full Functionality
Modules
Panda Data Control integration Full Functionality Full Functionality         Full Functionality
Advanced Reporting Tool integration Full Functionality Full Functionality         Full Functionality
SIEM integration Full Functionality Full Functionality         Full Functionality
Panda Patch Management Full Functionality Full Functionality Full Functionality Full Functionality   Full Functionality Full Functionality
Panda Full Encryption inregration Full Functionality Full Functionality Full Functionality Full Functionality   Full Functionality Full Functionality
High availability service Full Functionality Full Functionality Full Functionality Full Functionality Full Functionality Full Functionality Full Functionality
Host platform certifications ISO27001, SAS 70 ISO27001, SAS 70 ISO27001, FISMA, SAS70, PCI DSS
Supported operating systems
Supports Windows Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.
Suppots Exchange Full Functionality   Full Functionality   Full Functionality Full Functionality Full Functionality
Supports macOS X Full Functionality   Full Functionality Full Functionality Full Functionality Full Functionality Full Functionality
Supports Linux Full Functionality   Full Functionality Full Functionality Full Functionality Full Functionality Full Functionality
Supports Android Full Functionality   Full Functionality Full Functionality Full Functionality Full Functionality Full Functionality
Supports iOS         Full Functionality Full Functionality Full Functionality
Support for virtual environments - persistent and non-persistent (VDI)** Full Functionality Full Functionality Full Functionality Full Functionality   Full Functionality Full Functionality

* Panda Fusion is a bundle of Panda Endpoint Protection Plus and Panda Systems Management. Panda Fusion 360 is the combination of Panda Systems Management and Panda Adaptive Defense 360 that are sold separately
** Compatible systems with the following types of virtual machines: VMWare Desktop, VMware Server, VMware ESX, VMware ESXi, Citrix XenDesktop, XenApp, XenServer, MS Virtual Desktop y MS Virtual Servers. Panda Adaptive Defense 360 & Panda Fusion 360 solutions are compatible with Citrix Virtual Apps, Citrix Desktops 1906 & Citrix Workspace App for Windows, Panda Securtity has been verified as Citrix Ready partner.
1* 100% Classification Service.
2* Threat Hunting and Investigation Service

Cleaner Monitor:

Do you think your network could be infected, even though your antivirus tells you otherwise?

This is an advanced disinfection tool that runs a complete scan based on Collective Intelligence or cloud scanning in order to eliminate malware that traditional antivirus products are unable to detect. The benefits of having 25 years' experience detecting and disinfecting malware have enabled us to develop a solution that can monitor all the scans on your network and eliminate any latest generation viruses detected, remotely and from a centralized point.

Cleaner Monitor

Latest Technology
Latest Technology
Includes the latest technologies, which are more aggressive than conventional antivirus solutions in detecting and disinfecting latest threats.

Automatic Reset
Automatic Reset
Cuts out the manual tasks of restoring infected systems, automatically undoing the changes made by malware to operating systems and restoring system policies.

Central Monitoring
Central Monitoring
Stores all scan and disinfection results in a single cloud-hosted repository for all computers on the network. Access it through a simple Web browser and get the information that you need.

Compatible Con:

  • Windows 8 (32 and 64-bit)
  • Windows 7 (32 and 64-bit)
  • Windows Vista (32 and 64-bit)
  • Windows XP SP2 or later (32 and 64-bit)
  • Windows 2000 Professional
  • Windows Server 2003 (32 and 64 bits)
  • Windows Server 2008
  • Windows Server 2008 R2
  • Windows Server 2012 (32 and 64 bits)

Documentation:

Download the Panda Endpoint Protection Datasheet (.PDF)

 

Panda Endpoint Protection, 1-10 Users, 1 Year
- Price per user
#B1COPA
Our Price: $33.11
Panda Endpoint Protection, 11-25 Users, 1 Year
- Price per user
#B1COPB
Our Price: $30.47
Panda Endpoint Protection, 26-50 Users, 1 Year
- Price per user
#B1COPC
Our Price: $28.81
Panda Endpoint Protection, 51-100 Users, 1 Year
- Price per user
#B1COPD
Our Price: $25.17
Panda Endpoint Protection, 101-250 Users, 1 Year
- Price per user
#B1COPE
Our Price: $22.52
Panda Endpoint Protection, 251-500 Users, 1 Year
- Price per user
#B1COPF
Our Price: $21.52
Panda Endpoint Protection, 501-1000 Users, 1 Year
- Price per user
#B1COPG
Our Price: $18.21

For more than 1000 users, please use our Quote Request to request your pricing.

Panda Endpoint Protection, 1-10 Users, 2 Years
- Price per user
#B2COPA
Our Price: $59.61
Panda Endpoint Protection, 11-25 Users, 2 Years
- Price per user
#B2COPB
Our Price: $54.84
Panda Endpoint Protection, 26-50 Users, 2 Years
- Price per user
#B2COPC
Our Price: $51.86
Panda Endpoint Protection, 51-100 Users, 2 Years
- Price per user
#B2COPD
Our Price: $45.30
Panda Endpoint Protection, 101-250 Users, 2 Years
- Price per user
#B2COPE
Our Price: $40.53
Panda Endpoint Protection, 251-500 Users, 2 Years
- Price per user
#B2COPF
Our Price: $38.74
Panda Endpoint Protection, 501-1000 Users, 2 Years
- Price per user
#B2COPG
Our Price: $32.78

For more than 1000 users, please use our Quote Request to request your pricing.

Panda Endpoint Protection, 1-10 Users, 3 Years
- Price per user
#B3COPA
Our Price: $79.48
Panda Endpoint Protection, 11-25 Users, 3 Years
- Price per user
#B3COPB
Our Price: $73.12
Panda Endpoint Protection, 26-50 Users, 3 Years
- Price per user
#B3COPC
Our Price: $69.14
Panda Endpoint Protection, 51-100 Users, 3 Years
- Price per user
#B3COPD
Our Price: $60.40
Panda Endpoint Protection, 101-250 Users, 3 Years
- Price per user
#B3COPE
Our Price: $54.04
Panda Endpoint Protection, 251-500 Users, 3 Years
- Price per user
#B3COPF
Our Price: $51.66
Panda Endpoint Protection, 501-1000 Users, 3 Years
- Price per user
#B3COPG
Our Price: $43.71

For more than 1000 users, please use our Quote Request to request your pricing.

Panda Endpoint Protection for Mac, 1-10 Users, 1 Year
- Price per user
#B1COPMACA
Our Price: $41.03
Panda Endpoint Protection for Mac, 11-25 Users, 1 Year
- Price per user
#B1COPMACB
Our Price: $37.74
Panda Endpoint Protection for Mac, 26-50 Users, 1 Year
- Price per user
#B1COPMACC
Our Price: $35.69
Panda Endpoint Protection for Mac, 51-100 Users, 1 Year
- Price per user
#B1COPMACD
Our Price: $31.59
Panda Endpoint Protection for Mac, 101-250 Users, 1 Year
- Price per user
#B1COPMACE
Our Price: $28.72
Panda Endpoint Protection for Mac, 251-500 Users, 1 Year
- Price per user
#B1COPMACF
Our Price: $26.67
Panda Endpoint Protection for Mac, 501-1000 Users, 1 Year
- Price per user
#B1COPMACG
Our Price: $24.62

For more than 1000 users, please use our Quote Request to request your pricing.

Panda Endpoint Protection for Mac, 1-10 Users, 2 Years
- Price per user
#B2COPMACA
Our Price: $73.85
Panda Endpoint Protection for Mac, 11-25 Users, 2 Years
- Price per user
#B2COPMACB
Our Price: $67.94
Panda Endpoint Protection for Mac, 26-50 Users, 2 Years
- Price per user
#B2COPMACC
Our Price: $64.25
Panda Endpoint Protection for Mac, 51-100 Users, 2 Years
- Price per user
#B2COPMACD
Our Price: $56.86
Panda Endpoint Protection for Mac, 101-250 Users, 2 Years
- Price per user
#B2COPMACE
Our Price: $51.69
Panda Endpoint Protection for Mac, 251-500 Users, 2 Years
- Price per user
#B2COPMACF
Our Price: $48.00
Panda Endpoint Protection for Mac, 501-1000 Users, 2 Years
- Price per user
#B2COPMACG
Our Price: $44.31

For more than 1000 users, please use our Quote Request to request your pricing.

Panda Endpoint Protection for Mac, 1-10 Users, 3 Years
- Price per user
#B3COPMACA
Our Price: $98.47
Panda Endpoint Protection for Mac, 11-25 Users, 3 Years
- Price per user
#B3COPMACB
Our Price: $90.59
Panda Endpoint Protection for Mac, 26-50 Users, 3 Years
- Price per user
#B3COPMACC
Our Price: $85.66
Panda Endpoint Protection for Mac, 51-100 Users, 3 Years
- Price per user
#B3COPMACD
Our Price: $75.82
Panda Endpoint Protection for Mac, 101-250 Users, 3 Years
- Price per user
#B3COPMACE
Our Price: $68.93
Panda Endpoint Protection for Mac, 251-500 Users, 3 Years
- Price per user
#B3COPMACF
Our Price: $64.00
Panda Endpoint Protection for Mac, 501-1000 Users, 3 Years
- Price per user
#B3COPMACG
Our Price: $59.08

For more than 1000 users, please use our Quote Request to request your pricing.

Upsell to Panda Endpoint Protection Plus from Endpoint Protection, 1-10 Users, 1 Year
- Price per user
#UB1COPADA
Our Price: $5.76
Upsell to Panda Endpoint Protection Plus from Endpoint Protection, 11-25 Users, 1 Year
- Price per user
#UB1COPADB
Our Price: $5.30
Upsell to Panda Endpoint Protection Plus from Endpoint Protection, 26-50 Users, 1 Year
- Price per user
#UB1COPADC
Our Price: $5.01
Upsell to Panda Endpoint Protection Plus from Endpoint Protection, 51-100 Users, 1 Year
- Price per user
#UB1COPADD
Our Price: $4.38
Upsell to Panda Endpoint Protection Plus from Endpoint Protection, 101-250 Users, 1 Year
- Price per user
#UB1COPADE
Our Price: $3.92
Upsell to Panda Endpoint Protection Plus from Endpoint Protection, 251-500 Users, 1 Year
- Price per user
#UB1COPADF
Our Price: $3.75
Upsell to Panda Endpoint Protection Plus from Endpoint Protection, 501-1000 Users, 1 Year
- Price per user
#UB1COPADG
Our Price: $3.17

For more than 1000 users, please use our Quote Request to request your pricing.

Upsell to Panda Endpoint Protection Plus from Endpoint Protection, 1-10 Users, 2 Years
- Price per user
#UB2COPADA
Our Price: $10.37
Upsell to Panda Endpoint Protection Plus from Endpoint Protection, 11-25 Users, 2 Years
- Price per user
#UB2COPADB
Our Price: $9.54
Upsell to Panda Endpoint Protection Plus from Endpoint Protection, 26-50 Users, 2 Years
- Price per user
#UB2COPADC
Our Price: $9.03
Upsell to Panda Endpoint Protection Plus from Endpoint Protection, 51-100 Users, 2 Years
- Price per user
#UB2COPADD
Our Price: $7.88
Upsell to Panda Endpoint Protection Plus from Endpoint Protection, 101-250 Users, 2 Years
- Price per user
#UB2COPADE
Our Price: $7.05
Upsell to Panda Endpoint Protection Plus from Endpoint Protection, 251-500 Users, 2 Years
- Price per user
#UB2COPADF
Our Price: $6.74
Upsell to Panda Endpoint Protection Plus from Endpoint Protection, 501-1000 Users, 2 Years
- Price per user
#UB2COPADG
Our Price: $5.71

For more than 1000 users, please use our Quote Request to request your pricing.

Upsell to Panda Endpoint Protection Plus from Endpoint Protection, 1-10 Users, 3 Years
- Price per user
#UB3COPADA
Our Price: $13.83
Upsell to Panda Endpoint Protection Plus from Endpoint Protection, 11-25 Users, 3 Years
- Price per user
#UB3COPADB
Our Price: $12.73
Upsell to Panda Endpoint Protection Plus from Endpoint Protection, 26-50 Users, 3 Years
- Price per user
#UB3COPADC
Our Price: $12.03
Upsell to Panda Endpoint Protection Plus from Endpoint Protection, 51-100 Users, 3 Years
- Price per user
#UB3COPADD
Our Price: $10.51
Upsell to Panda Endpoint Protection Plus from Endpoint Protection, 101-250 Users, 3 Years
- Price per user
#UB3COPADE
Our Price: $9.41
Upsell to Panda Endpoint Protection Plus from Endpoint Protection, 251-500 Users, 3 Years
- Price per user
#UB3COPADF
Our Price: $8.99
Upsell to Panda Endpoint Protection Plus from Endpoint Protection, 501-1000 Users, 3 Years
- Price per user
#UB3COPADG
Our Price: $7.61

For more than 1000 users, please use our Quote Request to request your pricing.