Analytics
11/14/2012
05:18 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Panda Security Updates Cloud Partner Center

Latest version of the partner console allows management of Panda Security's entire cloud portfolio

Bracknell, Nov 13th, 2012:

Panda Security, The Cloud Security Company, today announced the release of its new 2.2 version of Panda Cloud Partner Center, an integrated solution for centrally managing computer security, which combines endpoint (servers, PCs and laptops) and email protection (for Exchange Server and cloud-based email). Panda Cloud Partner Center simplifies channel management through a central, Web-based console accessible from anywhere on the Internet.

Originally launched in 2011, the partner center allows channel partners and service providers to grow their business by selling security software simply and with maximum vendor autonomy. The partner console allows service providers to manage and monitor their customers' lifecycle easier and take advantage of new business opportunities through better insight into license extension and cross-selling.

Panda Cloud Partner Centre

The new console includes a wide array of solutions and enables simpler customer management and support. In addition, it provides partners with an always up-to-date pool of Panda Cloud Systems Management, Panda Cloud Office Protection, and now Panda Cloud Office Protection Advanced licenses, enabling them to manage trial versions, full versions and renewals. They can enjoy greater margins and discounts thanks to volume license purchasing, and will save time and money without costly onsite visits or management infrastructure overhead costs.

Partners will also benefit from exclusive special offers designed to increase customer loyalty and increase Partners revenue through upgrades and upsells. These offers will be of particular interest to Panda Cloud Office Protection customers who wish to also protect their Exchange Server enabling them to do so by upgrading to Panda Cloud Office Protection Advanced. The entire process is managed simply in a question of clicks from the Panda Cloud Partner Center console and all technical aspects are managed automatically and transparently to the Partner and end user.

This way, customers who choose to renew their Panda Cloud Office Protection licenses before their current subscription expires, will have the chance to have their licenses upgraded to Panda Cloud Office Protection Advanced. This will increase renewals and generate new revenue. Partners will also be able to view upcoming renewal information, managing them in advance and improving customer satisfaction.

Panda Cloud Partner Center simplifies access to information through custom reports and a full history of all license transactions (assignment and renewals). In addition, it generates automatic notifications about available licenses and licenses close to expiration, both through the console and via email. This simplifies IT security control, management, monitoring and maintenance tasks, while eliminating the need for onsite visits with its remote management capabilities.

Channel partners who want to sign up and benefit from the advantages offered by the new Panda Cloud Partner Center only have to contact the Panda Security sales team or visit http://www.pandasecurity.com/enterprise/solutions/cloud-partner-center for more information.

About Panda Security

Founded in 1990, Panda Security is the world's leading provider of cloud-based security solutions, with products available in more than 23 languages and millions of users located in 195 countries around the World. Panda Security was the first IT security company to harness the power of cloud computing with its Collective Intelligence technology. This innovative security model can automatically analyze and classify thousands of new malware samples every day, guaranteeing corporate customers and home users the most effective protection against Internet threats with minimum impact on system performance. Panda Security has 56 offices throughout the globe with US headquarters in Florida and European headquarters in Spain.

Panda Security collaborates with Special Olympics, WWF and Invest for Children as part of its Corporate Social Responsibility policy.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-7266
Published: 2015-02-01
Algorithmic complexity vulnerability in Cybozu Remote Service Manager through 2.3.0 and 3.x through 3.1.2 allows remote attackers to cause a denial of service (CPU consumption) via vectors that trigger colliding hash-table keys. NOTE: this vulnerability exists because of an incomplete fix for CVE-2...

CVE-2014-7269
Published: 2015-02-01
ASUS JAPAN RT-AC87U routers with firmware 3.0.0.4.378.3754 and earlier, RT-AC68U routers with firmware 3.0.0.4.376.3715 and earlier, RT-AC56S routers with firmware 3.0.0.4.376.3715 and earlier, RT-N66U routers with firmware 3.0.0.4.376.3715 and earlier, and RT-N56U routers with firmware 3.0.0.4.376....

CVE-2014-7270
Published: 2015-02-01
Cross-site request forgery (CSRF) vulnerability on ASUS JAPAN RT-AC87U routers with firmware 3.0.0.4.378.3754 and earlier, RT-AC68U routers with firmware 3.0.0.4.376.3715 and earlier, RT-AC56S routers with firmware 3.0.0.4.376.3715 and earlier, RT-N66U routers with firmware 3.0.0.4.376.3715 and earl...

CVE-2014-8630
Published: 2015-02-01
Bugzilla before 4.0.16, 4.1.x and 4.2.x before 4.2.12, 4.3.x and 4.4.x before 4.4.7, and 5.x before 5.0rc1 allows remote authenticated users to execute arbitrary commands by leveraging the editcomponents privilege and triggering crafted input to a two-argument Perl open call, as demonstrated by shel...

CVE-2014-9200
Published: 2015-02-01
Stack-based buffer overflow in an unspecified DLL file in a DTM development kit in Schneider Electric Unity Pro, SoMachine, SoMove, SoMove Lite, Modbus Communication Library 2.2.6 and earlier, CANopen Communication Library 1.0.2 and earlier, EtherNet/IP Communication Library 1.0.0 and earlier, EM X8...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
If you’re a security professional, you’ve probably been asked many questions about the December attack on Sony. On Jan. 21 at 1pm eastern, you can join a special, one-hour Dark Reading Radio discussion devoted to the Sony hack and the issues that may arise from it.