Panda Merges Cloud Cleaner Into RMM Platform

Cloud security specialist Panda Security has incorporated its Cloud Cleaner malware detection and disinfection tool into its Cloud Systems Management (PCSM) platform.

The PCSM is a remote management and monitoring (RMM) solution designed to help organisations manage, monitor and support a range of devices on their networks.

Infection Reaction

The results of the Cloud Cleaner scans can be viewed through the Cloud Cleaner, which features detection and disinfection technologies.

The platform is specifically designed to disinfect latest-generation viruses, such as zero-day attacks and targeted attacks, and the Cloud Cleaner Monitor will be initially launched as a “Technical Preview” version, available free of charge for every customer who requests it.

Cloud-Security-185x195“With the inclusion of Panda Cloud Cleaner in PCSM, it enables our corporate customers to quickly react against any type of infection, even those caused by latest generation malware,” Manuel Santamaría, product manager director at Panda Security, said in a statement. “PCSM brings the benefits offered by this tool to corporate environments, where quick response to malware infections and efficient control and management of IT networks are essential.”

With the inclusion of this new feature, IT administrators will now have the ability to roll out and run Cloud Cleaner across their network from the PCSM console.

Additionally, with the Cloud Cleaner Monitor’s Web-based console, IT admins will be able to view the scan results, as well as manage and monitor their IT assets at anytime, from anywhere.

Other Upgrades

Earlier this month the company announced other enhancements and features to PCSM, incorporating mobile device management (MDM) capabilities to control all types of mobile devices in the workplace centrally.

With the platform’s MDM capabilities, IT departments will be able to see which computers are online or offline and their location. They will also have complete visibility into the hardware and software installed on their devices, system information and system changes.

As for security and control, they will be able to enforce password policies, lock devices remotely and perform a remote factory reset of the device, erasing all personal and confidential information stored on it in case of loss or theft.

The updated functionality also gives IT administrators the ability to generate consolidated reports showing the status of all devices on the network, including smartphones and tablets.

All the new features add to those already present in previous versions, including the ability to perform network audits, manage files, monitor systems, provide remote support and generate reports.

Know all about IT security? Try our quiz!

Originally published on eWeek.

Nathan Eddy

Nathan Eddy is a contributor to eWeek and TechWeekEurope, covering cloud and BYOD

Recent Posts

NASA, Boeing To Begin Starliner Testing After ‘Anomalies’

American space agency prepares for testing of Boeing's Starliner, to ensure it has two space…

2 days ago

Meta Launches Friends Tab, As Zuck Touts ‘OG Facebook’

Zuckerberg seeks to revive Facebook's original spirit, as Meta launches Facebook Friends tab, so users…

3 days ago

WhatsApp Appeal Against EU Fine Backed By Court Advisor

Notable development for Meta, after appeal against 2021 WhatsApp privacy fine is backed by advisor…

3 days ago

Intel Board Shake-Up As Three Members Confirm Retirement

First sign of shake-up under new CEO Lip-Bu Tan? Three Intel board members confirm they…

3 days ago

Trump’s SEC Pick Pledges ‘Coherent’ Crypto Rules

Trump's nominee for SEC Chairman, Paul Atkins, has pledged a “rational, coherent, and principled approach”…

3 days ago