Vous êtes dans : Panda Security > partners > Panda Cloud Systems Management for Partners

Panda Cloud Systems Management for Partners

La nouvelle façon de gérer, contrôler et maintenir les systèmes informatiques


Essayez gratuitement nos solutions professionnelles

Évaluation de Panda Cloud Systems Management pendant 30 jours

Constatez par vous-même la simplicité de notre solution SaaS d'administration à distance de l'ensemble du parc informatique.

La version d'évaluation de 30 jours inclut les mises à jour automatiques et l'assistance technique pendant un mois.

Nous sommes là pour vous assister, avec une présence directe dans 61 pays

Trouvez votre revendeur Panda Security

Découvrez en quelques clics votre revendeur parmi notre réseau mondial de partenaires

Trouvez votre bureau Panda Security

Trouvez le bureau Panda Security le plus proche

Achetez ou renouvelez en ligne

Achetez ou renouvelez facilement votre abonnement depuis notre boutique en ligne

Panda Cloud Systems Management

Expand your client base and your service portfolio

Reduce costs and time dedicated to each service account

Increase customer loyalty and renewals

Keep IT central, keep IT simple

Certifications and awards

Expand your client base and your service portfolio

expand Understand the needs of your clients and offer more products and services.

  • Detection of unlicensed software.
  • Detection of obsolete hardware.
  • Server monitoring.
  • 24/7 support.
  • Cross-platform support (Windows, Mac, Android and iOS tablets and smartphones).
  • Tracking of printer supply usage.
  • Location and tracking of lost or stolen smartphones and tablets against confidential data loss.

Reduce costs and time dedicated to each service account

expand Gain greater profits.

  • Real-time warnings and logging of changes to hardware and software reduce incident response time.
  • No additional infrastructure required, the entire service is hosted in the cloud.
  • High level of automation of repetitive administrative tasks.
  • The Tickets System can reduce the average time spent resolving incidents, encouraging re-use of technical procedures.

Increase customer loyalty and renewals

expand Improve customer retention and perceived value.

  • Proactive, non-intrusive service avoids interrupting users.
  • Greater efficiency helps consolidate client loyalty.
  • Reports show clients all the action taken.
  • Professionalize your service by using your own brand image.

Keep IT central, keep IT simple

expand Take control and stay ahead of problems

  • Remote management of all customers’ devices, both in and out of the office, even when they are switched off.
  • Service can be accessed from anywhere at any time.
  • Zero learning curve– deploy in minutes.

expand Rapid product deploy.

  • 100% cloud-based solution: No additional infrastructure. Manage all devices any time, anywhere.
  • Extremely light agent that gives you permanent visibility of your devices. Firewall, NAT VPN friendly.
  • Automatic discovery devices: one agent on a network can discover other devices, and initiate an install of the agent.

expand Supports all devices.

  • Windows, Linux, Mac OS X, Android and iOS compatible.
  • Agentless management for SNMP-enabled devices.
  • Mobile device management (MDM) for smartphones and tablets: Geolocation, hardware and software inventory, remote wipe, remote lock, ability to remotely set security passwords.

expand Secure service access.

  • Secure access to the service: Two-factor authentication for identity verification.
  • Security certifications: FISMA, SAS70, ISO 27001 and PCI DSS.
  • Secure Communication: All communications between agents and server are encrypted (SSL).

expand Assets management.

  • Scheduled & On demand Audits: keeps track of all changes made to the device – hardware, software & system.
  • Software License Management: Track all installed software.
  • Patch management: Automate the deployment of updates and patches for installed software.
  • Software deployment: Deploy software and updates centrally to targeted devices across your IT estate.

expand Monitoring and proactive resolution.

  • Warnings & Monitoring: Control CPU, memory, disk usage, services, printers with low toner levels, etc. with performance graphs, dashboard warnings… all in real-time.
  • Policies: set a range of policies to manage your IT environment.
  • Scripting & Quick Jobs: Build your own scripts, or download pre-packaged scripts and launch them at the click of a button, scheduled or as an automatic response to a warning.
  • ComStore: expand the capabilities of our platform. Select the components that you need and download them into your own Component Library.

expand Remote support.

  • Non-intrusive remote access: Task manager, file transfer, registry editor, command prompt, event log viewer, Wake-on-Lan etc.
  • Remote control: Desktop access shared with the user or full control. Firewall & NAT Friendly.

expand Help Desk.

  • Tickets system: Organize, classify and prioritize incident troubleshooting.
  • Collaborative environment: Organize, classify and prioritize incident troubleshooting.
  • Device Notes: facilitate the creation of historical intervention.
  • Integrated chat in the remote control tool facilitates communication with end users.
Compatibilité avec les navigateurs
  • Internet Explorer 7
  • Chrome
  • FireFox
  • Opera
  • Safari
Postes de travail, ordinateurs portables, serveurs
Pour Windows
  • Windows XP SP2 (éditions Home, Professional, Professional x64, Tablet PC, Media Center, Starter)
  • Windows Vista 32/64bits (éditions Starter, Home Basic &Premium, Business, Enterprise, Ultimate)
  • Windows Server 2003 &R2 32/64bits (éditions Web, Standard, Enterprise, Datacenter, Small Business, Home Server)
  • Windows 7 (32-bit & 64-bit editions)
  • Windows 8 (32-bit & 64-bit editions)
  • Windows 2008 & R2 32/64bits (Standard, Enterprise, Datacenter, Web, Small Business)
  • Windows Server 2012 (64bits)
Pour Apple Macintosh
  • Mac OS X 10.6.x ou supérieur à processeur Intel
Pour Linux
  • Redhat 5.x ou supérieur
  • Fedora 19.x ou supérieur
  • CentOS 5.x ou supérieur
  • Debian 5.x ou supérieur
  • Ubuntu 11 ou supérieur
Pour smartphones et tablettes
  • iOS 6 et ultérieur
  • Android 2.3.3

Que voulez-vous protéger dans votre réseau ?