Facebook Twitter Linked In
Panacea InfoSec

Panacea InfoSec's Endpoint Security capabilities and endpoint security software provides a powerful enhancement to our Infrastructure Management framework.

The protection provided by our comprehensive endpoint security products will provide your small or mid-sized business with an essential security component and provides Enterprise SPAM, virus, spyware and malware protection.
By combining reactive antivirus and spyware detection with the latest proactive technologies, Panacea InfoSec's System's will be able to provide world-class antivirus protection against malicious programs in addition to guarding your company against unknown threats

Endpoint Security

Antivirus protection from Viruses, Worms and Trojans

Computer Viruses are detected by:

Email Scanner

Monitors all incoming and outgoing email by using plug-ins specifically designed for the most commonly used e-mail programs. The Email Scanner is an additional program for electronic mail monitoring and is designed for applications that support the POP3/SMTP protocols. Once detected, viruses are cleaned and/or quarantined. For some email clients, text certifying may be supported so that sent and received emails may be scanned for viruses. For increased levels of security when working with electronic mail, the Attachment Filter can be set by defining undesirable or suspect files.

Real-Time Protection

All files are scanned as they are copied, opened or saved. When the Real Time Protection discovers a virus in a file that has been accessed, the operation is immediately stopped so that the virus is not able to be activated. The Real Time Protection is loaded in the memory of the computer during your computer during system start-up. As such, the system areas of the computer are also protected.

On-Demand Scans
Scanning is a crucial aspect our endpoint security functionally. Scans may be run on-demand or scheduled to run at a more convenient time. This solution has predefined security profiles in addition to the ability to create customer profiles.


Spyware is often a variation of malware (an application that tries to obtain data from a computer without your knowledge or consent). Some spyware applications may be deliberately installed or downloaded and often contain advertisements, window pop-ups or other types of functionality that can wreck havoc with your computer. In an ideal word, the unwanted installation of spyware and malware should be completely blocked. The most common source of infection is unverified websites that pass on potentially dangerous content. Other methods of infection can include email or infection by worms and viruses. The best defense is to use an application that provides real time protection. One of the reasons our solution is so effective is that it performs like a resident shield and constantly scans applications in the background.

Centralized Management

Managed security profiles are defined and deployed to your computers using our centralized console interface. These profiles are used to establish best practices and help ensure that all of your computers are free from viruses and malware. All information detected is archived within the system and available for viewing by your executive summary and to provide detailed reporting.

Automated Deployment

As a fully integrated component of our IT Management Framework, this application is configured, deployed and managed from the same interface and console that your support team uses to manage other aspects of your environment. Once deployed, the system is monitored to ensure that protection is active and enabled. Updates are automatically performed on predetermined basis without the need for manual intervention. Therefore, your company is always protected as you will always have the latest software versions and updates. All activity and information detected is logged and archived in the customer database and available for your executive team at any time.

Virus Detection

The Scanning engine has received numerous awards for its excellent detection of "in the wild" viruses, including the VB100% award. Due to the unique combination of detection methods, our solution can provide your business with complete protection against viruses, worms and Trojans.

Leading Antispyware Technology

Detects spyware, adware, DLL-Trojans, keyloggers, and many more threats and vulnerabilities. Also detected are malware hidden in data streams, archives, or your Windows registry.

Real Time Access Protection

Every file opened, executed, or saved is scanned-offering you the maximum level of protection. In addition, this solution prevents the inadvertent opening or executing of infected files.

Flexible Intelligent Scanning

Certain files may be included or excluded from being scanned based on individual file extensions.

Complete Email Protection

Every email sent or received is monitored and scanned, providing the ultimate protection from email-borne threats. Naturally, MS Outlook is fully supported.

Automatic Threat Handling

Automatically quarantines or removes infected files and other threats including Trojans, worms and spyware.

Powerful Scheduling

Automatically provides best practices scanning and updating scheduling in addition to the ability to create custom-scheduled events.

Contact us