Panda Security Launches New Version Of Panda Cloud Office ProtectionPanda Security Launches New Version Of Panda Cloud Office Protection
Incorporates new heuristics technologies for both online and offline protection
July 17, 2010
ORLANDO, Fla., July 16 /PRNewswire/ -- Panda Security, The Cloud Security Company, has launched version 5.04.50 of Panda Cloud Office Protection, its cloud-based security solution for business endpoints. This new version includes several new features and improvements providing small and medium sized businesses as well as their service providers with an easier and more effective way to manage malware prevention, detection and remediation in distributed work environments.
One of the version's top features is the new heuristics technology it uses to prevent infections from unknown malware, allowing it to block threats even if the user is offline at the time of detection, or if the malware strain is new. Panda Cloud Office Protection is also now compatible with Office 2010, as well as its capacity to scan email messages stored in Windows Live Mail.
This new heuristic engine not only classifies files as suspicious, but also as malware or goodware, minimizing the risk of false positives. It also contains a small signature file that includes data about active malware every day, making protection more efficient with less impact on the user's PC. In addition, signature file updates are truly automatic requiring no administrative intervention to deploy and implement them across every workstation on the network.
Current clients of Panda Cloud Office Protection will be migrated free to the new version.
Demand for Panda's Cloud Solutions Outpaces Market Average
Panda Security has grown revenues for its cloud-based security solutions well above the market average. In 2009, Panda grew worldwide security-as-a-service/cloud product revenues by 122 percent over 2008, accounting for 20 percent of the company's corporate revenue.
These are the growth numbers by region: United States (100 percent); Latin America (302 percent); Southern Europe, Eastern Europe and Africa (313 percent); Asia/Pacific (119 percent); and Northern and Central Europe (122 percent).
Panda attributes this growth to the proven benefits of its cloud-based security solutions, including:
-- Real-time protection via Collective Intelligence, Panda's proprietary cloud-based system for automating the detection and analysis of malware -- Over 50 percent cost reduction since there is no need to invest in infrastructure -- Centralized, granular management of head offices, remote offices and mobile and roaming users with real-time information about the network security status -- Possibility of outsourcing security management, thanks to its ease of implementation, configuration and maintenance
Sales and Distribution
Panda Cloud Office Protection can be sold separately or as part of the Panda Cloud Protection suite, which also includes Panda Cloud Email Protection and Panda Cloud Internet Protection. Combined, the full Panda Cloud Protection suite covers all of the main infection vectors: endpoints and servers; corporate email; and Internet traffic.
For more information and a free product trial, go to http://cloudprotection.pandasecurity.com.
About Panda Security
Founded in 1990, Panda Security is the world's leading provider of cloud-based security solutions, with products available in more than 23 languages and millions of users located in 195 countries around the World. Panda Security was the first IT security company to harness the power of cloud computing with its Collective Intelligence technology. This innovative security model can automatically analyze and classify thousands of new malware samples every day, guaranteeing corporate customers and home users the most effective protection against Internet threats with minimum impact on system performance. Panda Security has 56 offices throughout the globe with US headquarters in Florida and European headquarters in Spain.
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023