Cloud security specialist Panda Security has incorporated its Cloud Cleaner malware detection and disinfection tool into its Cloud Systems Management (PCSM) platform.
The PCSM is a remote management and monitoring (RMM) solution designed to help organisations manage, monitor and support a range of devices on their networks.
The results of the Cloud Cleaner scans can be viewed through the Cloud Cleaner, which features detection and disinfection technologies.
The platform is specifically designed to disinfect latest-generation viruses, such as zero-day attacks and targeted attacks, and the Cloud Cleaner Monitor will be initially launched as a “Technical Preview” version, available free of charge for every customer who requests it.
With the inclusion of this new feature, IT administrators will now have the ability to roll out and run Cloud Cleaner across their network from the PCSM console.
Additionally, with the Cloud Cleaner Monitor’s Web-based console, IT admins will be able to view the scan results, as well as manage and monitor their IT assets at anytime, from anywhere.
Earlier this month the company announced other enhancements and features to PCSM, incorporating mobile device management (MDM) capabilities to control all types of mobile devices in the workplace centrally.
With the platform’s MDM capabilities, IT departments will be able to see which computers are online or offline and their location. They will also have complete visibility into the hardware and software installed on their devices, system information and system changes.
As for security and control, they will be able to enforce password policies, lock devices remotely and perform a remote factory reset of the device, erasing all personal and confidential information stored on it in case of loss or theft.
The updated functionality also gives IT administrators the ability to generate consolidated reports showing the status of all devices on the network, including smartphones and tablets.
All the new features add to those already present in previous versions, including the ability to perform network audits, manage files, monitor systems, provide remote support and generate reports.
Know all about IT security? Try our quiz!
Originally published on eWeek.
Suspended prison sentence for Craig Wright for “flagrant breach” of court order, after his false…
Cash-strapped south American country agrees to sell or discontinue its national Bitcoin wallet after signing…
Google's change will allow advertisers to track customers' digital “fingerprints”, but UK data protection watchdog…
Welcome to Silicon In Focus Podcast: Tech in 2025! Join Steven Webb, UK Chief Technology…
European Commission publishes preliminary instructions to Apple on how to open up iOS to rivals,…
San Francisco jury finds Nima Momeni guilty of second-degree murder of Cash App founder Bob…