Panda Full Encryption
The first line of defense to protect data simply and effectively
Panda Security is now a part of WatchGuard Technologies, please visit our WatchGuard Technologies website to learn more about this product!
Panda Full Encryption, is an additional module for Panda Security’s endpoint protection and advanced adaptive security solutions, designed to centrally manage full disk encryption.
Panda Full Encryption leverages BitLocker, a proven and stable Microsoft technology, to encrypt and decrypt disks without impacting end users and providing organizations with the added value of centrally controlling and managing the recovery keys stored on Panda Security's cloud-based management platform: Aether.
Centrally Stregthen Security Against Unauthorized Access
One of the most effective ways of minimizing data exposure is to automatically encrypt the hard drives on desktops, laptops and servers. This way, access to data is secure and complies with established authentication mechanisms. Establishing encryption policies provides an additional layer of security and control for organizations, although it may also lead to data control and recovery issues if the key is lost.
Panda Full Encryption leverages BitLocker, a proven and stable Microsoft technology, to encrypt and decrypt disks without impacting end users. It provides organizations with the added value of centrally controlling and managing the recovery keys stored on Panda Security's cloud-based management platform: Aether
Panda Full Encryption dashboard in Aether's web management console with key indicators of the encryption status of endpoints across the organization.
Panda Full Encryption, is an additional module for Panda Security’s endpoint protection and advanced adaptive security solutions, designed to centrally manage full disk encryption. It provides the following features:
Full drive encryption and decryption
Panda Full Encryption leverages BitLocker to fully encrypt the drives of your Windows laptops, desktops and servers. Panda Full Encryption dashboard provides global visibility into compatible network endpoints, their encryption status and the authentication method used, and enables administrators to assign encryption settings and restrict encryption permissions.
Centralized management of recovery keys
If the access key is forgotten, or there are changes in the boot sequence, BitLocker will ask for a recovery key to start up the affected system. If required, the network administrator can get the recovery key through the management console and send it to the user.
Lists and reports. Centralized policy application
The computer list in the console allows administrators to apply multiple filters based on encryption status. These lists can be exported for data analysis with external tools.
Define encryption policies from the console and view policy changes through audit reports you can present to regulatory bodies and institutions if required.
Computer list showing encryption status, the groups they belong to, their operating system and the authentication method used.
Prevent loss, theft and unauthorized access to data without impacting users
Encrypt your disks and protect their content against theft, accidental loss and malicious insiders. Data encryption, decryption and access are automatic, immediate, and seamless to users.
For your convenience, recovery keys are stored and recovered securely from the cloud platform and its web console.
No deployment or installation. No servers or additional costs. Zero problems
Panda Full Encryption centrally manages BitLocker, a proven and widely-used Windows technology.
BitLocker is included out of the box in most Windows operating systems, and with Aether Platform's web console you'll have a single centralized place to manage your devices.
You won't need to deploy or install another agent. All Aether-based solutions share the same lightweight agent.
The ability to centrally manage recovery keys from the cloud means you don't have to install or maintain servers to manage them.
Panda Full Encryption can be enabled immediately and is easily managed through Aether Platform's userfriendly interface
Regulatory compliance, reports and central management
Panda Full Encryption aids and simplifies compliance with data protection regulations by monitoring and enforcing BitLocker activation on Windows devices.
All Aether-based solutions provide intuitive dashboards, detailed reports and change audits.
Additionally, its role-based management allows administrators to implement different authorization levels and different policies for groups and devices from a single centralized web console.
Cloud Based Management Platform:
Aether’s cloud-based platform and management console, common for all of Panda’s endpoint solutions, provide optimized advanced and adaptive security management inside and outside the corporate network. Minimize complexity and maximize flexibility, granularity and scalability.
Achieve more in less time. Easy implementation
- Deploy, install and configure the solution in minutes. Immediate value from day one.
- A single lightweight agent for all products and platforms (Windows, Mac, Linux and Android).
- Automatic discovery of unprotected endpoints. Remote installation.
- Proprietary proxy and repository/cache technologies. Optimized communication even with endpoints without an Internet connection.
Simplified operations. Adapts to your organization
- Intuitive Web console. Flexible, modular management that reduces the total cost of ownership.
- Configures users with total or limited visibility and permissions. Action audit.
- Group and endpoint-based security policies. Predefined and custom roles.
- Hardware and software inventories and change log.
Easy scaling of security and management capabilities over time
- No need for new infrastructure to deploy the modules. No deployment costs.
- Real-time communication with endpoints from a single Web console.
- Dashboards and indicators per module.
The minimum requirements of Panda Full Encryption are as follows:
- Supported operating system versions
- Windows 7 (Ultimate, Enterprise)
- Windows 8/8.1 (Pro, Enterprise)
- Windows 10 (Pro, Enterprise, Education)
- Windows Server 2008 R2 and higher (excluding Server Core editions)
- Hardware requirements:
- Free space for installation: 650 MB.
- TPM (Trusted Platform Module) 1.2 and higher if this authentication method is used.
- USB key and compatible computers able to read USB devices from BIOS on Windows 7 systems without TPM.
Download the Panda Full Encryption Datasheet (.PDF)