Panda Cloud Antivirus – Promising Cloud Security Tool

Panda Cloud Antivirus Version 1.3

There has been an exponential growth in new viruses and malicious software that are appearing everyday on different IT platforms. Curbing this problem hasn’t been easy; it’s more like a game of cat and mouse. Newer threats and malware is created everyday and as a counter-measure, newer updates and patches of different anti-virus software are available. Keeping a large database free of malware requires an antivirus that provides the required level of protection without compromising the computational speed of the cloud; Panda Cloud Antivirus is one software that has the capability to do that.

“Panda Cloud Antivirus is the best free antivirus software available… the next evolution of anti-malware technology”.

Editors’ Choice “Best Free Antivirus” November 2009 & June 2010, PC Magazine USA.

Over a year ago, the utility took the market with a storm when it became the first free cloud-based utility in the category of Antivirus. Panda Cloud’s strong competitors (AVG, Avast, Avira) couldn’t keep up the rivalry when the 1.0 version of Panda Cloud got the Editor’s choice for Best Free Antivirus. The simplistic view of the application was one of the striking features of the software. Unlike most Antivirus software where you find an endless display of complicated buttons,

Some of the new Features for Version 1.3

  • Malicious Web & URL Filtering.
  • Unified Recycle Bin and Quarantine.
  • Automatic and transparent upgrades to new product versions

Behavior based detection is also one of the features which allows instant identification of online threats. The scanning speed and efficiency of the software is also impressive. The utility identifies around 90% of the Malware and the scan times are also on the lower side. The progress bar is quite interactive and shows the threats that are being neutralized by the utility.

After the scan a detailed report is generated that lists the number of threats identified and the consequent action
taken. A step by step guide is also available which advices the user which action to take.

A professional version of the application has also been created which also includes features like USB auto vaccine and a deep analysis of running processes which justifies the price of this application. This way, Windows auto run is disabled and execution of potentially unwanted software is restricted. If an unwanted file execution is detected, it can be countered within seconds (at most, 30 seconds). The advanced settings panel included in this version beefs up the security and Malware detection by adding more features to the software. The newer version of Panda Cloud requires a little more processing power to operate than its preceding version.

Apart from the price tag it carries, this Antivirus earns a good repute. The free edition isn’t any less impressive than the paid edition but overall the software is highly recommended for all type of users regardless of the fact that you are a beginner or a network administrator.

By Glenn Blake

About Glenn Blake

Glenn Blake is a writer for CloudTweaks and has been writing about technology trends for over 25 years.

Find out more
View All Articles

Sorry, comments are closed for this post.

The Success Formula For Private Cloud Deployments

The Success Formula For Private Cloud Deployments

OpenStack For Private Clouds On February 15th Tom Bittman of Gartner published a blog which asserted that 95% of Private Clouds are Failing. When an industry analyst makes a statement that big, in one of the top three priorities for enterprise CIOs today, it’s critical that we as an industry step back and understand how we…

What Technology Can Displace The Password?

What Technology Can Displace The Password?

The Future Password Many people shout that the password is dead or should be killed dead. The password could be killed, however, only when there is an alternative to the password. Let us think about what technology can displace the password. Some people might say that multi-factor authentications or ID federations will do it. It is not…

The Meaning Of Secure Business Agility In The Cloud

The Meaning Of Secure Business Agility In The Cloud

Secure Business Agility In The Cloud As cloud continues to accelerate business delivery and shift away the balance of power from IT and InfoSec to business users, organizations need to find ways to ensure that security is part of a business process rather than an afterthought. Today’s organizations are transacting some of their most valuable…

Where Is The Tipping Point For The Flying Drone Market?

Where Is The Tipping Point For The Flying Drone Market?

The Flying Drone Market In the past year I have written a number of articles here on CloudTweaks about Drones. I enjoy flying drones. One thing I’ve used my drone for is proving I didn’t need to do the worst fall maintenance job ever. Cleaning the gutters of the house by flying the drone around…

AWS re:Invent: Billions & Billions of Dollars

AWS re:Invent: Billions & Billions of Dollars

AWS re:Invent The massive AWS re:Invent show this week in Las Vegas is a celebration of cloud computing. What was formerly debatable is now inevitable: the world is moving to cloud. Amazon’s annual cloud revenues of about $7 billion, combined with an estimated $5 billion annual run rate by competitor Microsoft Azure, and the odd…

New Smartphones From Apple, Samsung and HTC Promise To Light Up 2016

New Smartphones From Apple, Samsung and HTC Promise To Light Up 2016

New Smartphones from Apple, Samsung and HTC (Sponsored post courtesy of Verizon Wireless) The launch of the Galaxy S7 Edge at the Mobile World Congress in Barcelona during February was the first shot in a vintage year for mobile phones. The S7 is an incredible piece of hardware, but launches from HTC and Apple later in the…

Featured Sponsored Articles
How Successful Businesses Ensure Quality Team Communication

How Successful Businesses Ensure Quality Team Communication

Quality Team Communication  (Sponsored post courtesy of Hubgets) Successful team communication and collaboration are as vital to project and overall business success as the quality of products and services an organization develops. We rely on a host of business tools to ensure appropriate customer interactions, sound product manufacturing, and smooth back-end operations. However, the interpersonal relationships…

Featured Sponsored Articles
How To Develop A Business Continuity Plan Using Internet Performance Management

How To Develop A Business Continuity Plan Using Internet Performance Management

Internet Performance Management Planning CDN Performance Series Provided By Dyn In our previous post, we laid out the problems of business continuity and Internet Performance Management in today’s online environment.  In this article, we will take a look at some of the ways you can use traffic steering capabilities to execute business continuity planning and…

Featured Sponsored Articles

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Sponsor