Mac

Panda Security Launches Panda Antivirus for Mac Corporate Edition

Panda Security has launched of Panda Antivirus for Mac Corporate Edition. The new solution is ideal for companies operating with hybrid computing environments, delivering complete protection against all types of malware that affect Macintosh computers, regardless of whether they're running on Mac OS, Mac OS X, Windows or Linux. The product protects Mac desktops, laptops and servers, as well as prevents Apple devices such as iPhones, iPads and iPods from transmitting malware to other operating systems.

"Many companies, universities, and other organizations now operate with a diverse network topology including Mac servers and workstations that work alongside Windows and other systems," said Bruno Rodriguez, Corporate Product Director at Panda Security. "In these mixed environments, it is crucial to protect against specific threats that target Apple platforms, as well as ensure Mac devices cannot be used as carriers for threats to other platforms. Panda Antivirus for Mac Corporate Edition takes care of all these concerns through a single solution."

Panda Antivirus for Mac Corporate Edition includes a centralized administration console thatsimplifies the job of deploying the solution across networks, and facilitates the implementation of security policies and real-time monitoring of security. This is a major benefit for organizations with limited in-house security expertise and funding that still need a reliable and robust security solution for their Mac-based infrastructure.

Panda Antivirus for Mac Corporate Edition includes two scan engines: one to deliver on-access or resident protection, and the other to perform on-demand scans on folders, files and email, detecting and eliminating or blocking all types of threats. In addition to protecting against Mac-specific malware, the software also addresses the full range of threats – Trojans, viruses, exploits, spyware, keyloggers, adware, hacking tools, botnets, dialers, scareware and others – designed for Windows that can also affect the Mac platform, particularly Web-based threats. The additional protection provided by scanning support for Apple's iPhone, iPad, and iPod ensures that if any of these devices is carrying malware, it can't infect other connected devices or Macintosh computers. Since it operates in the background, taking advantage of available resources and kicking in when resource loads are low, it has little to no impact on system performance and speed. In 2009, just 34 vulnerabilities were discovered in the Mac OS. According to vulnerability experts Secunia, this figure rose to 308 in 2010, and 67 percent of these were classified as highly critical, indicating that an attacker could take control of unpatched systems and repurpose or exploit those systems at will.

"2010 was an intense year for threats. We have collected more than 20 million new examples of malware, and the figure continues to rise. Each day, our laboratory receives approximately 63,000 new threats," said Luis Corrons, technical director of PandaLabs. "We've seen an increase in the number of threats designed specifically for Macs, although there are many more that can affect corporate Mac users, including all Office macro viruses. Other types of threats that Mac users are increasingly exposed to include phishing, and vulnerabilities in popular browsers and PDF readers."

Featured

  • Survey: 48 Percent of Worshippers Feel Less Safe Attending In-Person Services

    Almost half (48%) of those who attend religious services say they feel less safe attending in-person due to rising acts of violence at places of worship. In fact, 39% report these safety concerns have led them to change how often they attend in-person services, according to new research from Verkada conducted online by The Harris Poll among 1,123 U.S. adults who attend a religious service or event at least once a month. Read Now

  • AI Used as Part of Sophisticated Espionage Campaign

    A cybersecurity inflection point has been reached in which AI models has become genuinely useful in cybersecurity operation. But to no surprise, they can used for both good works and ill will. Systemic evaluations show cyber capabilities double in six months, and they have been tracking real-world cyberattacks showing how malicious actors were using AI capabilities. These capabilities were predicted and are expected to evolve, but what stood out for researchers was how quickly they have done so, at scale. Read Now

  • Why the Future of Video Security Is Happening Outside the Cloud

    For years, the cloud has captivated the physical security industry. And for good reasons. Remote access, elastic scalability and simplified maintenance reshaped how we think about deploying and managing systems. Read Now

  • UL Solutions Launches Artificial Intelligence Safety Certification Services

    UL Solutions Inc., a global leader in safety science, today announced the launch of artificial intelligence (AI) safety certification services, enabling comprehensive assessments for evaluating the safety of AI-powered products. Read Now

  • ESA Announces Initiative to Introduce the SECURE Act in State Legislatures

    The Electronic Security Association (ESA), the national voice for the electronic security and life safety industry, has announced plans to introduce the SECURE Act in state legislatures across the country beginning in 2025. The proposal, known as Safeguarding Election Candidates Using Reasonable Expenditures, provides a clear framework that allows candidates and elected officials to use campaign funds for professional security services. Read Now

    • Guard Services

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.