Panda Security has unveiled a cloud-based, software-as-a-service security suite designed to protect corporate resources.
Cloud Internet Protection (CIP) offers protection from botnets, phishing, cross-site scripting and web 2.0 attacks, and provides peer-to-peer and browser vulnerability protection, according to the firm.
Panda claims that an updated access control feature provides better regulation of web 2.0 applications and social networks. CIP uses dynamic content classification technologies to identify web 2.0 applications, and integrates with LDAP/AD for authentication.
Administrators can manage network protection from a single access point using CIP's NanoLog technology, Panda said, and can use a web console for real-time analysis and consolidated reports.
No capital outlay is required to deploy CIP, and implementation is launched through a global network of servers. These should ensure higher reliability, speedier response time and lower latency, the firm said.
Panda said that its worldwide processing gateways can administer 250,000 transactions per second, which it claims is 50 to 100 times more than other proxy servers.
Panda Cloud Internet Protection is sold separately or as part of Panda's Cloud Protection suite.
Panda launches cloud-based security suite
By
Spencer Dalziel
on Apr 16, 2010 9:56AM

Got a news tip for our journalists? Share it with us anonymously here.
Partner Content

How NinjaOne Is Supporting The Channel As It Builds An Innovative Global Partner Program

Build cybersecurity capability with award winning Fortinet training from Ingram Micro

Tech For Good program gives purpose and strong business outcomes
Ingram Micro Ushers in the Age of Ultra

Kaseya Dattocon APAC 2024 is Back
Sponsored Whitepapers
-1.jpg&w=100&c=1&s=0)
Stop Fraud Before It Starts: A Must-Read Guide for Safer Customer Communications

The Cybersecurity Playbook for Partners in Asia Pacific and Japan

Pulseway Essential Eight Framework

7 Best Practices For Implementing Human Risk Management

2025 State of Machine Identity Security Report