Panda Security Adds Cloud Cleaner to RMM Platform

The platform is specifically designed to disinfect latest-generation viruses, such as zero-day attacks and targeted attacks.

Cloud security specialist Panda Security announced the incorporation of its Cloud Cleaner malware detection and disinfection tool into the company’s Cloud Systems Management (PCSM) platform, a remote management and monitoring solution designed to help organizations manage, monitor and support a range of devices on their networks.

The results of the Cloud Cleaner scans can be viewed through the Cloud Cleaner, which features detection and disinfection technologies.

The platform is specifically designed to disinfect latest-generation viruses, such as zero-day attacks and targeted attacks, and the Cloud Cleaner Monitor will be initially launched as a "Technical Preview" version, available free of charge for every customer who requests it.

"With the inclusion of Panda Cloud Cleaner in PCSM, it enables our corporate customers to quickly react against any type of infection, even those caused by latest generation malware," Manuel Santamaría, product manager director at Panda Security, said in a statement. "PCSM brings the benefits offered by this tool to corporate environments, where quick response to malware infections and efficient control and management of IT networks are essential."

With the inclusion of this new feature, IT administrators will now have the ability to roll out and run Cloud Cleaner across their network from the PCSM console.

Additionally, with the Cloud Cleaner Monitor’s Web-based console, IT admins will be able to view the scan results, as well as manage and monitor their IT assets at anytime, from anywhere.

Earlier this month the company announced other enhancements and features to PCSM, incorporating mobile device management (MDM) capabilities to control all types of mobile devices in the workplace centrally.

With the platform’s MDM capabilities, IT departments will be able to see which computers are online or offline and their location. They will also have complete visibility into the hardware and software installed on their devices, system information and system changes.

As for security and control, they will be able to enforce password policies, lock devices remotely and perform a remote factory reset of the device, erasing all personal and confidential information stored on it in case of loss or theft.

The updated functionality also gives IT administrators the ability to generate consolidated reports showing the status of all devices on the network, including smartphones and tablets.

All the new features add to those already present in previous versions, including the ability to perform network audits, manage files, monitor systems, provide remote support and generate reports.