Choose country:
Choose language:
This is a demo of a seamless insert of an Icecat LIVE product data-sheet in your website. Imagine that this responsive data-sheet is included in the product page of your webshop. How to integrate Icecat LIVE JavaScript.

Panda Security for Business Electronic Software Download (ESD)

The general trademark of a manufacturer by which the consumer knows its products. A manufacturer can have multiple brand names. Some manufacturers license their brand names to other producers.
Product name:
Product name is a brand's identification of a product, often a model name, but not totally unique as it can include some product variants. Product name is a key part of the Icecat product title on a product data-sheet.
Security for Business
Product code :
The brand's unique identifier for a product. Multiple product codes can be mapped to one mother product data-sheet if the specifications are identical. We map away wrong codes or sometimes logistic variants.
A software licence permits you to use a piece of software legally. An software upgrade is a newer or better version, in order to bring the software up to date or to improve its characteristics.
Software Licenses/Upgrades
Data-sheet quality: created/standardized by Icecat
The quality of the product data-sheet can be on several levels:
only logistic data imported: we have only basic data imported from a supplier, a data-sheet is not yet created by an editor.
created byPanda: a data-sheet is imported from an official source from a manufacturer. But the data-sheet is not yet standardized by an Icecat editor.
created/standardized by Icecat: the data-sheet is created or standardized by an Icecat editor.
Product views: 3082
This statistic is based on the 88534 using ecommerce sites (eshops, distributors, comparison sites, ecommerce ASPs, purchase systems, etc) downloading this Icecat data-sheet since Only sponsoring brands are included in the free Open Icecat content distribution as used by 86533 free Open Icecat users.
Info modified on: 26 Jun 2018 07:00:40
The date of the most recent change of this product data-sheet in Icecat.
Long product name Panda Security for Business Electronic Software Download (ESD) :
The short editorial description of Panda Security for Business Electronic Software Download (ESD)

Security for Business with Exchange, 2-25 license, 2 year
Panda Security for Business Electronic Software Download (ESD):
The official marketing text of Panda Security for Business Electronic Software Download (ESD) as supplied by the manufacturer

Complete centralized monitoring of all the corporate network computers

The AdminSecure Management console allows the administrator to manage the global security of the network from one or more points (in the case of additional administrators), optimizing computer productivity and allowing centralized policies to be applied quickly and efficiently.

Efficient security solution

The different modules included in each solution offer each company, regardless of its size, the right security level for its system structure.

Ensures corporate policy fulfillment and optimizes employee productivity

The administrator can distribute policies to the computers, and block access to restricted applications or files from the central console.

Simplifies risk Management

Corporate solutions enable automatic in-depth audits to detect hidden malware that could have gone unnoticed during other scans.

Protects your company's critical assets

Proactive technologies provide an additional protection layer against all types of unknown malware, targeted attacks and Internet threats.

Proven and reliable services

Our corporate solutions include 24x7 support all year round.


Centralized all-in-one console

All protections are managed from a single centralized point

Most advanced proactive technology

The most recognized proactive technologies, composed of intrusion prevention, proactive detection and behavioral analysis

In-depth malware audits

Malware Radar is capable of uncovering and disinfecting advanced hidden threats

Network access control

Prevents infected, insecure or compromised PCs from connecting to your network and contaminating your files and data

Anti-spam for desktops

Based on Recurrent Pattern Detection™ (RPD™), a content-agnostic technology that detects and blocks spam in any language

Application control

Allows administrators to have complete control over endpoint and network resources

Real-time information

Wide range of detailed detection activity reports which can be customized and configured to be sent periodically to administrators

Centrally-managed Quarantine

Help controls suspected files and determine the actions to take. It includes the possibility to send suspicious files to PandaLabs for analysis

Short summary description Panda Security for Business Electronic Software Download (ESD):
This short summary of the Panda Security for Business Electronic Software Download (ESD) data-sheet is auto-generated and uses the product title and the first six key specs.

Panda Security for Business, 2 year(s), Electronic Software Download (ESD)

Long summary description Panda Security for Business Electronic Software Download (ESD):
This is an auto-generated long summary of Panda Security for Business Electronic Software Download (ESD) based on the first three specs of the first five spec groups.

Panda Security for Business. License term in years: 2 year(s), Software type: Electronic Software Download (ESD)

Software type *
The category of software.
Electronic Software Download (ESD)
License level purchase required
2 - 25 license(s)
License term in years
The terms of the contract to use the product e.g. software license.
2 year(s)
Description of a technology platform including a processor, chipset, platform software and wired networking capabilities.
64-bit computing
The use of processors that have datapath widths, integer size, and memory addresses widths of 64 bits (eight octets). In 2003 64-bit CPUs were introduced to the (previously 32-bit) mainstream personal computer arena in the form of the x86-64 and 64-bit PowerPC processor architectures and in 2012 even into the ARM architecture targeting smartphones and tablet computers, first sold on September 20, 2013 in the iPhone 5S powered by the ARMv8-A Apple A7 SoC.
Windows operating systems supported *
Windows vesions wich can be used with the device.
Windows 2000,Windows 2000 Professional,Windows 7 Enterprise,Windows 7 Enterprise x64,Windows 7 Home Basic,Windows 7 Home Basic x64,Windows 7 Home Premium,Windows 7 Home Premium x64,Windows 7 Professional,Windows 7 Professional x64,Windows 7 Starter,Windows 7 Starter x64,Windows 7 Ultimate,Windows 7 Ultimate x64,Windows Vista Business,Windows Vista Business x64,Windows Vista Enterprise,Windows Vista Enterprise x64,Windows Vista Home Basic,Windows Vista Home Basic x64,Windows Vista Home Premium,Windows Vista Home Premium x64,Windows Vista Ultimate,Windows Vista Ultimate x64,Windows XP Home,Windows XP Home x64,Windows XP Professional,Windows XP Professional x64
Linux operating systems supported
8 RT. Linux (9.4, 9.5), Red Hat Enterprise Linux 5.0 (supported with a pre-built package); SUSE Linux (10.3, 11.0, 11, 11.1, 11.2), Fedora (9, 9.0, 10, 10.0, 11.0, 11, 12, 12.0), Ubuntu (8.04, 8.04.1, 8.04.2, 8.10, 9.04, 9.10, 10.04), Debian (5.0, 5.0.1, 5.0.2, 5.0.3)
Server operating systems supported
Windows Server 2003,Windows Server 2008
Country Distributor
United Kingdom 1 distributor(s)
Customer service details