New features in Panda Cloud Office Protection

New Panda Cloud Office Protection 7.00

New dashboards, detailed reports and remediation actions

New dashboards

The new dashboards will let you see at a glance the most relevant information about your computers’ licenses and protection status.

New dashboards

Improved detection reports

This version provides more detailed information about detections. Get access to comprehensive threat information organized by risk level, and identify most infected computers quickly and simply.

Improved detection reports
Remedial action before problems

Remediation actions against problems

Administrators can take the following actions on network computers from the Web console:

• Disinfect computers using Panda’s malware removal tool against next-generation viruses.

• Force computers to restart to finish installing updates or for any other reason.

• Access information about how to troubleshoot protection problems.

Synchronous communication between computers and the Web console

From version 7.00, computers will receive commands and configuration changes in a maximum of 15 minutes instead of 4 hours as in previous versions.

Synchronous communication between machines and console

New Panda Cloud Office Protection 6.81

Improved troubleshooting and OS X support.

Ability to send computer information to Support

Now you can easily submit detailed information about computers with incidents.

Enter a short description of the problem and click “Report problem with this computer”.

This feature will allow us to continue to improve our service, reducing incident response time.

Envío de información a soporte

Web access control

Now you can also monitor and control the Web pages visited from your Windows servers.

Control de acceso a páginas web
Protección para OS X

Protection for OS X

Just like any other system, OS X computers can be infected through vulnerabilities in applications like Java, and become a source of infection for other computers on your corporate network.

With the new protection, your OS X computers and corporate network will be completely secure.

New operating system support

The protection now supports Windows 8.1 and Windows Server 2012 R2.

Windows 8.1

New Panda Cloud Office Protection 6.50

More protection. More control.

Web access control

Panda Cloud Office Protection Advanced now lets you monitor and control websites visited and block unproductive and/or dangerous websites for your company.

All without the need to install ‘heavy’ browser bars that slow down Web browsing regardless of the browser used.

Web access control
Protection for Linux

Protection for Linux

Run on-demand and scheduled scans on Linux computers (SUSE, RedHat, Ubuntu and Debian), just like you do on Windows.

Even more protection

The new anti-exploit technology detects and neutralizes malware like Blackhole or Redkit that exploits zero-day vulnerabilities (in Java, Adobe, MS Office, etc.), before it infects the computer.

And, to keep things simple, this technology integrates seamlessly with Panda Cloud Office Protection’s antivirus protection.

Even more protection
New update settings

New update settings

Select the perfect time to update your protection with the new update settings.

Reports where and how you want them

Save your favorite reports so you can run them at a later time without having to set up all the filters again. Schedule reports to run periodically and have them automatically sent out via email to specific recipients.

Reports where and how you want them

New Panda Cloud Office Protection 6.0

More powerful. As easy as ever.

Protection for Windows 8 and Windows Server 2012

Now you can protect your Windows 8 and Windows Server 2012 systems.

Windows 8

New protection for Exchange Servers

Now you can protect your Exchange servers, too.

The main benefits of this protection are:
• Antivirus and anti-spam protection.
• 100% managed from the Web console.

Protección para Exchange Servers

Take control of devices

The new Device Control technologies prevent the spread of malware through the improper use of external devices.

These controls allow organizations to improve productivity by enforcing policies to deny access, force read-only access or grant total access on multiple devices types (USB flash drives, digital cameras, DVDs and more).

Take control of devices
Even more protection

Even more protection

We have added new heuristic technologies to detect new and unknown malware threats. Select “Suspicious items“ and stay protected from the latest viruses.

Additionally, we are always on the lookout to neutralize all types of malicious activitity on your computers. More information

Quarantine malware...
just in case

Now, removed malware is kept in quarantine for three days. During this period, you can restore it to its original location on each computer where it was found with just one click.

Troubleshoot false positives in the blink of an eye.

Quarantine malware... just in case
Less connections. Better performance.

Less connections.
Better performance.

You can now centralize all Internet communications through a single computer that will also store all downloaded files.

This way, the other computers on the network won´t have to access the Internet to download them, increasing speed and reducing bandwidth usage.