Panda Merges Cloud Cleaner Into RMM Platform

Cloud security specialist Panda Security has incorporated its Cloud Cleaner malware detection and disinfection tool into its Cloud Systems Management (PCSM) platform.

The PCSM is a remote management and monitoring (RMM) solution designed to help organisations manage, monitor and support a range of devices on their networks.

Infection Reaction

The results of the Cloud Cleaner scans can be viewed through the Cloud Cleaner, which features detection and disinfection technologies.

The platform is specifically designed to disinfect latest-generation viruses, such as zero-day attacks and targeted attacks, and the Cloud Cleaner Monitor will be initially launched as a “Technical Preview” version, available free of charge for every customer who requests it.

“With the inclusion of Panda Cloud Cleaner in PCSM, it enables our corporate customers to quickly react against any type of infection, even those caused by latest generation malware,” Manuel Santamaría, product manager director at Panda Security, said in a statement. “PCSM brings the benefits offered by this tool to corporate environments, where quick response to malware infections and efficient control and management of IT networks are essential.”

With the inclusion of this new feature, IT administrators will now have the ability to roll out and run Cloud Cleaner across their network from the PCSM console.

Additionally, with the Cloud Cleaner Monitor’s Web-based console, IT admins will be able to view the scan results, as well as manage and monitor their IT assets at anytime, from anywhere.

Other Upgrades

Earlier this month the company announced other enhancements and features to PCSM, incorporating mobile device management (MDM) capabilities to control all types of mobile devices in the workplace centrally.

With the platform’s MDM capabilities, IT departments will be able to see which computers are online or offline and their location. They will also have complete visibility into the hardware and software installed on their devices, system information and system changes.

As for security and control, they will be able to enforce password policies, lock devices remotely and perform a remote factory reset of the device, erasing all personal and confidential information stored on it in case of loss or theft.

The updated functionality also gives IT administrators the ability to generate consolidated reports showing the status of all devices on the network, including smartphones and tablets.

All the new features add to those already present in previous versions, including the ability to perform network audits, manage files, monitor systems, provide remote support and generate reports.

Know all about IT security? Try our quiz!

Originally published on eWeek.

Nathan Eddy

Nathan Eddy is a contributor to eWeek and TechWeekEurope, covering cloud and BYOD

Recent Posts

Craig Wright Sentenced For Contempt Of Court

Suspended prison sentence for Craig Wright for “flagrant breach” of court order, after his false…

2 days ago

El Salvador To Sell Or Discontinue Bitcoin Wallet, After IMF Deal

Cash-strapped south American country agrees to sell or discontinue its national Bitcoin wallet after signing…

2 days ago

UK’s ICO Labels Google ‘Irresponsible’ For Tracking Change

Google's change will allow advertisers to track customers' digital “fingerprints”, but UK data protection watchdog…

2 days ago

EU Publishes iOS Interoperability Plans

European Commission publishes preliminary instructions to Apple on how to open up iOS to rivals,…

3 days ago

Momeni Convicted In Bob Lee Murder

San Francisco jury finds Nima Momeni guilty of second-degree murder of Cash App founder Bob…

3 days ago