Panda Cloud Antivirus – Promising Cloud Security Tool

Panda Cloud Antivirus Version 1.3

There has been an exponential growth in new viruses and malicious software that are appearing everyday on different IT platforms. Curbing this problem hasn’t been easy; it’s more like a game of cat and mouse. Newer threats and malware is created everyday and as a counter-measure, newer updates and patches of different anti-virus software are available. Keeping a large database free of malware requires an antivirus that provides the required level of protection without compromising the computational speed of the cloud; Panda Cloud Antivirus is one software that has the capability to do that.

“Panda Cloud Antivirus is the best free antivirus software available… the next evolution of anti-malware technology”.

Editors’ Choice “Best Free Antivirus” November 2009 & June 2010, PC Magazine USA.

Over a year ago, the utility took the market with a storm when it became the first free cloud-based utility in the category of Antivirus. Panda Cloud’s strong competitors (AVG, Avast, Avira) couldn’t keep up the rivalry when the 1.0 version of Panda Cloud got the Editor’s choice for Best Free Antivirus. The simplistic view of the application was one of the striking features of the software. Unlike most Antivirus software where you find an endless display of complicated buttons,

Some of the new Features for Version 1.3

  • Malicious Web & URL Filtering.
  • Unified Recycle Bin and Quarantine.
  • Automatic and transparent upgrades to new product versions

Behavior based detection is also one of the features which allows instant identification of online threats. The scanning speed and efficiency of the software is also impressive. The utility identifies around 90% of the Malware and the scan times are also on the lower side. The progress bar is quite interactive and shows the threats that are being neutralized by the utility.

After the scan a detailed report is generated that lists the number of threats identified and the consequent action
taken. A step by step guide is also available which advices the user which action to take.

A professional version of the application has also been created which also includes features like USB auto vaccine and a deep analysis of running processes which justifies the price of this application. This way, Windows auto run is disabled and execution of potentially unwanted software is restricted. If an unwanted file execution is detected, it can be countered within seconds (at most, 30 seconds). The advanced settings panel included in this version beefs up the security and Malware detection by adding more features to the software. The newer version of Panda Cloud requires a little more processing power to operate than its preceding version.

Apart from the price tag it carries, this Antivirus earns a good repute. The free edition isn’t any less impressive than the paid edition but overall the software is highly recommended for all type of users regardless of the fact that you are a beginner or a network administrator.

By Glenn Blake

About Glenn Blake

Glenn Blake is a writer for CloudTweaks and has been writing about technology trends for over 25 years.

View Website
View All Articles

Sorry, comments are closed for this post.

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks Does cloud security risks ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that, and…

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Infrastructure-as-a-Service Security It’s no secret many organizations rely on popular cloud providers like Amazon and Microsoft for access to computing infrastructure. The many perks of cloud services, such as the ability to quickly scale resources without the upfront cost of buying physical servers, have helped build a multibillion-dollar cloud industry that continues to grow each…

Digital Twin And The End Of The Dreaded Product Recall

Digital Twin And The End Of The Dreaded Product Recall

The Digital Twin  How smart factories and connected assets in the emerging Industrial IoT era along with the automation of machine learning and advancement of artificial intelligence can dramatically change the manufacturing process and put an end to the dreaded product recalls in the future. In recent news, Samsung Electronics Co. has initiated a global…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…