See at a glance the most important changes in your IT network. New, more modern and easier-to-understand detection graphs for easier consultation and decision making.
Responsive design so that the console adapts itself to fit desktop, tablet and smartphone screens without affecting performance.
Faster and more powerful graphs with more visual and accurate information to identify potential security threats that require immediate action.
This version adds the ability to create automatic groups based on Active Directory.
Any computers added to these groups will be organized according to the Active Directory structure they belong to.
Panda Cloud Office Protection is now called Panda Endpoint Protection (Panda Endpoint Protection Plus in the case of the Advanced version). Additionally, the look and feel of the consoles has also been changed (new colors, fonts, images, etc.) to better reflect Panda's new brand identity.
Protect your Android systems just as easily as any other device in your organization.
Panda Endpoint Protection Plus provides antivirus as well as anti-theft protection for your Android devices (Remote Lock, Remote Wipe, Geo-Location and Snap the Thief).
From now on, users will have to identify themselves through our IdP (Identity Provider) platform to access our consoles.
This represents a significant improvement in terms of security and user experience, and changes the way we create user credentials, allowing users to change their passwords, validating their email addresses, etc.
This version adds the ability to set rules to automatically distribute computers into groups and assign a configuration profile to them based on their IP addresses.
The protection engine has been updated with the latest technologies and improvements developed by Panda.
The protection for Exchange Server includes a new Content Filtering feature that allows you to filter messages based on the extension of the attachments. Filter out unwanted content and neutralize malware on your Exchange servers easily.
The new version enables you to locally view detailed information about the spam and Content Filter detections made on your Exchange servers. Use the reports to find any messages that may have not been received by the relevant recipients.
Create exceptions and allow the use of certain devices by certain users in your organization: senior executives, IT personnel, etc. Version 7.10 lets you set up a whitelist of devices not affected by the restrictions established in the configuration profile.
Now, you can also block or allow mobile devices in Panda Cloud Office Protection.
Version 7.10 includes a new local console with an improved look and feel. Additionally, a new Administrator mode has been introduced to allow network administrators to temporarily enable and disable protections from end-users' computers without having to access the Web console. This mode is password-protected.
From now on, you will be notified in the console when a new version of the protection is available. This message will include a link to the new features included in the solution and a button to upgrade to the new version. If you prefer not to upgrade at that time, Panda Cloud Office Protection will upgrade following its normal cycle.
The new dashboards will let you see at a glance the most relevant information about your computers' licenses and protection status.
This version provides more detailed information about detections. Get access to comprehensive threat information organized by risk level, and identify most infected computers quickly and simply.
Administrators can take the following actions on network computers from the Web console:
Disinfect computers using Panda's malware removal tool against next-generation viruses.
Force computers to restart to finish installing updates or for any other reason.
Access information about how to troubleshoot protection problems.
From version 7.00, computers will receive commands and configuration changes in a maximum of 15 minutes instead of 4 hours as in previous versions.
Now you can easily submit detailed information about computers with incidents.
Enter a short description of the problem and click Report problem with this computer.
This feature will allow us to continue to improve our service, reducing incident response time.
Now you can also monitor and control the Web pages visited from your Windows servers.
Just like any other system, OS X computers can be infected through vulnerabilities in applications like Java, and become a source of infection for other computers on your corporate network.
With the new protection, your OS X computers and corporate network will be completely secure.
The protection now supports Windows 8.1 and Windows Server 2012 R2.
Panda Cloud Office Protection Advanced now lets you monitor and control websites visited and block unproductive and/or dangerous websites for your company.
All without the need to install 'heavy' browser bars that slow down Web browsing regardless of the browser used.
Run on-demand and scheduled scans on Linux computers (SUSE, RedHat, Ubuntu and Debian), just like you do on Windows.
The new anti-exploit technology detects and neutralizes malware like Blackhole or Redkit that exploits zero-day vulnerabilities (in Java, Adobe, MS Office, etc.), before it infects the computer.
And, to keep things simple, this technology integrates seamlessly with Panda Cloud Office Protection's antivirus protection.
Select the perfect time to update your protection with the new update settings.
Save your favorite reports so you can run them at a later time without having to set up all the filters again. Schedule reports to run periodically and have them automatically sent out via email to specific recipients.
Now you can protect your Windows 8 and Windows Server 2012 systems.
Now you can protect your Exchange servers, too.
The main benefits of this protection are:
Antivirus and anti-spam protection.
100% managed from the Web console.
The new Device Control technologies prevent the spread of malware through the improper use of external devices.
These controls allow organizations to improve productivity by enforcing policies to deny access, force read-only access or grant total access on multiple devices types (USB flash drives, digital cameras, DVDs and more).
We have added new heuristic technologies to detect new and unknown malware threats. Select "Suspicious items" and stay protected from the latest viruses.
Additionally, we are always on the lookout to neutralize all types of malicious activitity on your computers. More information
Now, removed malware is kept in quarantine for three days. During this period, you can restore it to its original location on each computer where it was found with just one click.
Troubleshoot false positives in the blink of an eye.
You can now centralize all Internet communications through a single computer that will also store all downloaded files.
This way, the other computers on the network won't have to access the Internet to download them, increasing speed and reducing bandwidth usage.