Panda Security Releases Cloud Office Protection 6.5
The platform’s new anti-exploit technologies can detect malware that exploits zero-day vulnerabilities in Java, Adobe or Microsoft Office.Cloud-based security solutions specialist Panda Security announced the release of Panda Cloud Office Protection (PCOP) version 6.5, offering technological and functional improvements compared to the previous version, including URL filtering and anti-exploit technologies to detect and remove malware that exploits zero-day vulnerabilities. The latest edition also boasts compatibility with Microsoft Exchange 2013 and some of the most popular Linux distributions, including SUSE, RedHat, Debian and Ubuntu, and the ability to schedule reports from the Panda Cloud Office Protection console. Up to now, scheduled reports were only available to partners using Panda Cloud Partner Center. Cloud Office Protection 6.5 also leverages Panda Security’s Collective Intelligence system. The platform’s new anti-exploit technologies are capable of detecting malware such as Blackhole or Redkit that exploits zero-day vulnerabilities in Java, Adobe or Microsoft Office, among others, before it infects users’ computers. The company said the solution’s major differentiating factor lies in its ability to identify new, unknown malware variants capable of infecting thousands of computers around the world. "We aim to help companies increase their productivity with a solution that allows businesses to monitor and control employees’ use of the Internet, while protecting them when they browse the Web or download contents," Manuel Santamaría, global product manager at Panda Security, said in a statement. "Our new solution facilitates security management and provides an additional layer of protection against malicious Internet links and exploits that take advantage of system vulnerabilities."
The solution’s URL filtering feature provides enhanced protection for users against malware and phishing URLs over HTTP and HTTPS, adding an additional layer of security to their Web browsing. This way, if a URL is catalogued as malicious, any attempt to access it or download any content from it will be automatically blocked by the system.