Endpoint
3/16/2010
02:15 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Panda Cloud Antivirus Awarded ICSA Labs Certification

Panda Cloud Antivirus earned certification for its anti-virus desktop/server detection and anti-virus cleaning capabilities

ORLANDO, Fla., March 16 /PRNewswire/ -- Panda Security, the Cloud Security Company, today announced that Panda Cloud Antivirus (www.cloudantivirus.com) has received the first certification for a cloud-based antivirus product from ICSA Labs, an independent division of Verizon Business. An early entrant into the market, Panda Cloud Antivirus earned certification for its anti-virus desktop/server detection and anti-virus cleaning capabilities.

"It's exciting to see the security software industry move to a cloud-based architecture that will deliver big benefits to consumers and businesses, such as faster scanning speeds," says Andrew Hayter, anti-malcode program manager at ICSA Labs. "Especially in a nascent market, it's critical company products are rigorously tested by a third-party certification body, such as ICSA Labs, to verify that high standards of quality and reliability are met."

According to Pedro Bustamante, senior research advisor at Panda Security, "Panda Cloud Antivirus has received acclaim since its launch for both its technological innovation as one of the first cloud-based antivirus products with no impact on system resources, but also for the effectiveness with which it detects and neutralizes malware. The certification from ICSA Labs confirms that our solution is truly effective in protecting our users."

Panda Cloud Antivirus is free and can be downloaded from www.cloudantivirus.com. It is available in German, English, Spanish, Greek, French, Italian, Dutch, Polish, Portuguese, Swedish and Simplified Chinese.

Panda Cloud Antivirus, from Panda Security, represents a new security model based on ultra light client/server architecture to process and block malware more effectively and efficiently than traditional products which rely on locally installed signature files. By shifting the process of analyzing and identifying malware to the cloud, and applying non-intrusive interception techniques in client architecture, Panda Cloud Antivirus delivers advanced protection against new and unknown viruses with an extremely light, resource-friendly agent.

To achieve the ICSA Labs Anti-Virus Certification, products must meet all criteria for detection of malware in desktops and servers. Products must demonstrate they have the capability to detect, identify and prevent self-replicating malware while reporting no false positives.

Additionally Panda Cloud Antivirus has met all criteria for cleaning of malware on desktops and servers, which includes removal of "in-the-wild" viruses from infected files and sectors. The certified products must be able to remove all viruses without adversely affecting the data or functionality that existed before the infection.

About Panda Security

Founded in 1990, Panda Security is the world's leading provider of cloud-based security solutions, with products available in more than 23 languages and millions of users located in 195 countries around the world. Panda Security was the first IT security company to harness the power of cloud computing with its Collective Intelligence technology. This innovative security model can automatically analyze and classify thousands of new malware samples every day, guaranteeing corporate customers and home users the most effective protection against Internet threats with minimum impact on system performance. Panda Security has 56 offices throughout the globe with US headquarters in California and European headquarters in Spain.

Panda Security collaborates with Special Olympics, WWF and Invest for Children as part of its Corporate Social Responsibility policy.

For more information, visit http://www.pandasecurity.com/.

About ICSA Labs

ICSA Labs, an independent division of Verizon Business, offers vendor-neutral testing and certification of security products. Many of the world's top security vendors submit their products for testing and certification at ICSA Labs. Businesses rely on ICSA Labs to authoritatively set and apply objective testing and certification criteria for measuring product compliance and reliability. ICSA Labs was the first security-product testing organization to earn ISO/IEC 17025 accreditation, validating the laboratory's world-class capabilities. For more information about ICSA Labs, visit: http://www.icsalabs.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6117
Published: 2014-07-11
Dahua DVR 2.608.0000.0 and 2.608.GV00.0 allows remote attackers to bypass authentication and obtain sensitive information including user credentials, change user passwords, clear log files, and perform other actions via a request to TCP port 37777.

CVE-2014-0174
Published: 2014-07-11
Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.

CVE-2014-3485
Published: 2014-07-11
The REST API in the ovirt-engine in oVirt, as used in Red Hat Enterprise Virtualization (rhevm) 3.4, allows remote authenticated users to read arbitrary files and have other unspecified impact via unknown vectors, related to an XML External Entity (XXE) issue.

CVE-2014-3499
Published: 2014-07-11
Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.

CVE-2014-3503
Published: 2014-07-11
Apache Syncope 1.1.x before 1.1.8 uses weak random values to generate passwords, which makes it easier for remote attackers to guess the password via a brute force attack.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.