Panda DesktopSecure for Linux: Prevents data loss. Simple to install and keep updated. Incorporates all the protection you need in a single product.
Panda DesktopSecure for Linux is the ideal solution for computers running Linux. It is designed to respond to the specific protection demands of home computers, both laptops and PCs, running this operating system.
This powerful and simple to use antivirus includes a wide range of technologies and a firewall in order to prevent data loss from your PC caused by viruses, hackers and intruders.
DesktopSecure for Linux is a single product that will keep your Linux computer safe and prevent Internet-borne security threats from spreading among your contacts.
Here are some key features of "Panda DesktopSecure":
· Panda DesktopSecure for Linux neutralizes all types of threats: viruses, worms, Trojans, dialers, spyware, spam; regardless of the source of the threat: Windows or Linux. DesktopSecure also incorporates a heuristic engine that can detect potential threats and block them until the disinfection routine is available.
Permanent mail protection:
· Email is the main means of propagation used by malware. It is essential to ensure that you have permanent protection that monitors the email messages sent to users’ mailboxes in order to eliminate the threat before it infects the file system. Panda DesktopSecure scans mail reaching the most widely used mail clients, such as Ximian Evolution, Kmail, Mozilla Mail and Thunderbird
Ease of use:
· Panda DesktopSecure has been specifically designed for home computers and workstations, providing an intuitive graphic interface based on X-Window, which is fully compatible with the majority of distributions and desktops on the market, such as Gnome and KDE.
· DesktopSecure can also warn you in the case of incidents and offers clear reports of the scans carried out, and includes a detailed information system to keep you informed.
· DesktopSecure for Linux incorporates firewall technology to protect against access attempts from remote computers and external connection attempts from the protected computer, identifying the application involved as if it were a personal firewall. This firewall can also be configured using system rules to administer external connections.