You're in: Panda Security > IT Security for Business > Security Solutions for Enterprise > Panda Cloud Systems Management

Panda Cloud Systems Management

Die neue Art IT-Systeme zu verwalten, zu überwachen und zu sichern

 

€ 79.90

 

 

 

Testen Sie unsere Unternehmenslösungen kostenfrei

Panda Cloud Systems Management 30-Tages-Testversion

überzeugen Sie sich selbst von der Einfachheit unserer Remote Management SaaS Produkte für alle Ihre Geräte.



Die 30-Tages-Testversion beinhaltet automatische Updates und einen technischen Rund-um-die-Uhr-Support.




Wir helfen Ihnen mit direkter Präsenz in 61 Ländern

Finden Sie Ihren Panda Security Fachhändler

Entdecken Sie unser weltweites Reseller-Netzwerk in nur 3 Schritten


Finden Sie eine Panda Security Niederlassung

Finden Sie die Panda Security Niederlassung in Ihrer Nähe


Online Kaufen oder Verlängern

Kaufen oder verlängern Sie Ihren Abonnement-Service einfach über unseren Online-Shop

Panda Cloud Systems Management


Get it under control: asset management

Stop fire fighting and dramatically lower your IT costs

Keep IT central, keep IT simple

Give end users the best support experience regardless of where they are

Don’t just create value, demonstrate it

Don't lose track of your smartphones and tablets

Certifications and awards

Get IT under control: Asset management

expand Control what you own.

  • 100% granular visibility of what you manage.
  • Keep up-to-datewith your environment and changes.
  • Control what software is installed and running on which device.

Stop fire fighting and dramatically lower your IT costs

expand Reduce repetitive work, phone calls and become pro-active.

  • Real-time alerts for printers with low toner levels, servers with low disk space and other issues or problems.
  • Automate manually repetitive tasks.
  • Logs track all the info on each device.
  • Patch management keeps all devices up-to-date.

Keep IT central, keep IT simple

expand Manage all IT resources from a single web-based console, with all the necessary information and tools.

  • 100% cloud-hosted. No additional infrastructure.
  • Manage all devices regardless of where they are or where you are, any time, anywhere.
  • Near zero learning curve.

Don’t just create value, prove it

expand Evaluate the work done.

  • Show who did what, with which device and for how long, etc.
  • Demonstrate decreases in downtime and time dedicated to support.
  • Identify problematic hardware/software.

Give end users the best support experience regardless of where they are

expand Pro-active and non-intrusive issue resolution will drastically cut support calls.

  • Remotely monitor and support all devices, even if they are switched off.
  • Non-intrusive diagnostics and issue resolution for greater productivity.

Don't lose track of your smartphones and tablets

expand Manage and control your mobile devices from a single tool.

  • Prevent data theft from stolen devices with password-based security and remote wipe.
  • Locate stolen devices.
  • Control installed apps and device performance.

expand Rapid product deploy.

  • 100% cloud-based solution: No additional infrastructure. Manage all devices any time, anywhere.
  • Extremely light agent that gives you permanent visibility of your devices. Firewall, NAT VPN friendly.
  • Automatic discovery devices: one agent on a network can discover other devices, and initiate an install of the agent.

expand Supports all devices.

  • Windows, Linux, Mac OS X, Android and iOS compatible.
  • Agentless management for SNMP-enabled devices.
  • Mobile device management (MDM) for smartphones and tablets: Geolocation, hardware and software inventory, remote wipe, remote lock, ability to remotely set security passwords.

expand Secure service access.

  • Secure access to the service: Two-factor authentication for identity verification.
  • Security certifications: FISMA, SAS70, ISO 27001 and PCI DSS.
  • Secure Communication: All communications between agents and server are encrypted (SSL).

expand Assets management.

  • Scheduled & On demand Audits: keeps track of all changes made to the device – hardware, software & system.
  • Software License Management: Track all installed software.
  • Patch management: Automate the deployment of updates and patches for installed software.
  • Software deployment: Deploy software and updates centrally to targeted devices across your IT estate.

expand Monitoring and proactive resolution.

  • Warnings & Monitoring: Control CPU, memory, disk usage, services, printers with low toner levels, etc. with performance graphs, dashboard warnings… all in real-time.
  • Policies: set a range of policies to manage your IT environment.
  • Scripting & Quick Jobs: Build your own scripts, or download pre-packaged scripts and launch them at the click of a button, scheduled or as an automatic response to a warning.
  • ComStore: expand the capabilities of our platform. Select the components that you need and download them into your own Component Library.

expand Remote support.

  • Non-intrusive remote access: Task manager, file transfer, registry editor, command prompt, event log viewer, Wake-on-Lan etc.
  • Remote control: Desktop access shared with the user or full control. Firewall & NAT Friendly.

expand Help Desk.

  • Tickets system: Organize, classify and prioritize incident troubleshooting.
  • Collaborative environment: Organize, classify and prioritize incident troubleshooting.
  • Device Notes: facilitate the creation of historical intervention.
  • Integrated chat in the remote control tool facilitates communication with end users.
Kompatible Browser
  • Internet Explorer 7
  • Chrome
  • Firefox
  • Opera
  • Safari
Workstations, Laptops, Server
Für Windows
  • Windows XP SP2 (Home, Professional, Professional x64, Tablet PC, Media Center, Starter Editions)
  • Windows Vista 32/64bits (Starter, Home Basic & Premium, Business, Enterprise, Ultimate Editions)
  • Windows Server 2003 & R2 32/64bits (Web, Standard, Enterprise, Datacenter, Small Business, Home Server Editions)
  • Windows 7 (32-bit & 64-bit editions)
  • Windows 8/8.1 (32-bit & 64-bit editions)
  • Windows 2008 & R2 32/64bits (Standard, Enterprise, Datacenter, Web, Small Business)
  • Windows Server 2012 (64bits) & Windows Server 2012 R2
Für Apple Macintosh
  • Intel basierter Mac OS X 10.6.x oder neuer
Für Linux
  • Redhat 5.x oder neuer
  • Fedora 19.x oder neuer
  • CentOS 5.x oder neuer
  • Debian 5.x oder neuer
  • Ubuntu 11 oder neuer
Für smartphones and tablets
  • iOS 6 oder neuer
  • Android 2.3.3
 


Was möchten Sie in Ihrem Netzwerk schützen?
 
Search