Endpoint
3/16/2010
02:15 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Panda Cloud Antivirus Awarded ICSA Labs Certification

Panda Cloud Antivirus earned certification for its anti-virus desktop/server detection and anti-virus cleaning capabilities

ORLANDO, Fla., March 16 /PRNewswire/ -- Panda Security, the Cloud Security Company, today announced that Panda Cloud Antivirus (www.cloudantivirus.com) has received the first certification for a cloud-based antivirus product from ICSA Labs, an independent division of Verizon Business. An early entrant into the market, Panda Cloud Antivirus earned certification for its anti-virus desktop/server detection and anti-virus cleaning capabilities.

"It's exciting to see the security software industry move to a cloud-based architecture that will deliver big benefits to consumers and businesses, such as faster scanning speeds," says Andrew Hayter, anti-malcode program manager at ICSA Labs. "Especially in a nascent market, it's critical company products are rigorously tested by a third-party certification body, such as ICSA Labs, to verify that high standards of quality and reliability are met."

According to Pedro Bustamante, senior research advisor at Panda Security, "Panda Cloud Antivirus has received acclaim since its launch for both its technological innovation as one of the first cloud-based antivirus products with no impact on system resources, but also for the effectiveness with which it detects and neutralizes malware. The certification from ICSA Labs confirms that our solution is truly effective in protecting our users."

Panda Cloud Antivirus is free and can be downloaded from www.cloudantivirus.com. It is available in German, English, Spanish, Greek, French, Italian, Dutch, Polish, Portuguese, Swedish and Simplified Chinese.

Panda Cloud Antivirus, from Panda Security, represents a new security model based on ultra light client/server architecture to process and block malware more effectively and efficiently than traditional products which rely on locally installed signature files. By shifting the process of analyzing and identifying malware to the cloud, and applying non-intrusive interception techniques in client architecture, Panda Cloud Antivirus delivers advanced protection against new and unknown viruses with an extremely light, resource-friendly agent.

To achieve the ICSA Labs Anti-Virus Certification, products must meet all criteria for detection of malware in desktops and servers. Products must demonstrate they have the capability to detect, identify and prevent self-replicating malware while reporting no false positives.

Additionally Panda Cloud Antivirus has met all criteria for cleaning of malware on desktops and servers, which includes removal of "in-the-wild" viruses from infected files and sectors. The certified products must be able to remove all viruses without adversely affecting the data or functionality that existed before the infection.

About Panda Security

Founded in 1990, Panda Security is the world's leading provider of cloud-based security solutions, with products available in more than 23 languages and millions of users located in 195 countries around the world. Panda Security was the first IT security company to harness the power of cloud computing with its Collective Intelligence technology. This innovative security model can automatically analyze and classify thousands of new malware samples every day, guaranteeing corporate customers and home users the most effective protection against Internet threats with minimum impact on system performance. Panda Security has 56 offices throughout the globe with US headquarters in California and European headquarters in Spain.

Panda Security collaborates with Special Olympics, WWF and Invest for Children as part of its Corporate Social Responsibility policy.

For more information, visit http://www.pandasecurity.com/.

About ICSA Labs

ICSA Labs, an independent division of Verizon Business, offers vendor-neutral testing and certification of security products. Many of the world's top security vendors submit their products for testing and certification at ICSA Labs. Businesses rely on ICSA Labs to authoritatively set and apply objective testing and certification criteria for measuring product compliance and reliability. ICSA Labs was the first security-product testing organization to earn ISO/IEC 17025 accreditation, validating the laboratory's world-class capabilities. For more information about ICSA Labs, visit: http://www.icsalabs.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6306
Published: 2014-08-22
Unspecified vulnerability on IBM Power 7 Systems 740 before 740.70 01Ax740_121, 760 before 760.40 Ax760_078, and 770 before 770.30 01Ax770_062 allows local users to gain Service Processor privileges via unknown vectors.

CVE-2014-0232
Published: 2014-08-22
Multiple cross-site scripting (XSS) vulnerabilities in framework/common/webcommon/includes/messages.ftl in Apache OFBiz 11.04.01 before 11.04.05 and 12.04.01 before 12.04.04 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, which are not properly handled in a (1)...

CVE-2014-3525
Published: 2014-08-22
Unspecified vulnerability in Apache Traffic Server 4.2.1.1 and 5.x before 5.0.1 has unknown impact and attack vectors, possibly related to health checks.

CVE-2014-3563
Published: 2014-08-22
Multiple unspecified vulnerabilities in Salt (aka SaltStack) before 2014.1.10 allow local users to have an unspecified impact via vectors related to temporary file creation in (1) seed.py, (2) salt-ssh, or (3) salt-cloud.

CVE-2014-3587
Published: 2014-08-22
Integer overflow in the cdf_read_property_info function in cdf.c in file through 5.19, as used in the Fileinfo component in PHP before 5.4.32 and 5.5.x before 5.5.16, allows remote attackers to cause a denial of service (application crash) via a crafted CDF file. NOTE: this vulnerability exists bec...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Three interviews on critical embedded systems and security, recorded at Black Hat 2014 in Las Vegas.