ADAPTIVE DEFENSE

Tomorrow’s protection against today’s threats

Panda’s endpoint detection and response (EDR) service is the best cyber-security solution to protect your business against targeted attacks and advanced persistent threats.

 
 

PREVENT ZERO-DAY ATTACKS AND APTs

Adaptive Defense protects every endpoint, server, laptop and road warrior on your corporate network, detecting and blocking the malware and unusual behavior that other products on the market are unable to stop.

WHY DO YOU NEED ADAPTIVE DEFENSE IF YOU ALREADY HAVE AN ANTIVIRUS IN YOUR COMPANY?

The volume of malware has increased exponentially and attacks have become far more sophisticated.

This new trend, combined with the increasing complexity of IT environments, is allowing hackers to access companies and leave malware which then remains hidden for long periods.

Traditional antivirus solutions are efficient against commodity malware, but they fail to prevent the new generation of advanced threats and targeted attacks.

Adaptive Defense is an endpoint detection and response (EDR) service that can accurately classify every process running in an organization, only allowing legitimate programs to run.

The new technology included in Adaptive Defense will allow you to protect your business against targeted and zero-day attacks which exploit the time lapse between the appearance of a new virus and its neutralization by security vendors.

 

Gartner

"Panda is the first EPP vendor to deliver a full process inventory attestation service. As a result, it can advise customers of the source and reputation of all executed files. This is a significant innovation with respect to traditional malware detection services."

 

WE’VE MADE PREVENTION THE BEST DEFENSE AGAINST TARGETED ATTACKS

VISIBILITY

Be 100% sure of the applications run in your company.

Get complete visibility into the applications run on your company's endpoints and servers, as well as every action carried out on your systems.

DETECTION AND BLOCKING

Real-time prevention of targeted attacks on your company

Detect and block targeted and zero-day attacks in real time before they occur.

 

PROTECTION AND RESPONSE BASED ON INFORMATION

Get all the information you need about attacks targeting your systems

Thanks to the forensic reports provided by Adaptive Defense, you will have all the data you need about attacks targeting your systems, allowing you to analyze them and build new security barriers for your IT environment.

ATTACK PREVENTION

Isolate your business from future attacks

Block any applications that are not considered goodware, isolating your company from future attacks.

 
 

ALL ABOUT ADAPTIVE DEFENSE

Protection and disinfection

BASIC AND EXTENDED BLOCKING

Adaptive Defense provides two types of application blocking to secure your company against any IT attack:

Basic blocking allows applications classified as goodware to run, as well as those that are yet to be cataloged by Panda Security's automated systems and malware experts.

Extended blocking only permits the execution of applications classified as goodware. This is the ideal form of protection for companies with a ‘zero risk’ approach to security.

PROTECTION FOR VULNERABLE SYSTEMS

Endpoints and servers with operating systems that are not updated will no longer be a problem for the integrity of your IT security.

Adaptive Defense offers protection for vulnerable systems with operating systems no longer supported by the vendor, such as Windows XP, without the need to install a traditional antivirus.

 
NO FALSE POSITIVES THANKS TO BIG DATA AND THE CLOUD

Adaptive Defense monitors all the actions that occur as a consequence of the running of any application on your company’s workstations and servers.

This monitoring process, in conjunction with Machine Learning on Big Data platforms in the cloud, enables us to identify and classify the behavior of every application.

Panda Security experts also analyze any applications that are not classified automatically in order to obtain detailed knowledge of the processes being run in your organization.

In short, you can decide at any time which applications are run in your company. Adaptive Defense will give you the peace of mind that any application run in your organization is 100% safe for the security of your environment. Always, and without false positives

 

Service management

100% MANAGED SERVICE

Panda Security’s latest technologies based on Machine Learning and Big Data environments give Adaptive Defense the ability to automatically classify applications without end-user intervention.

ZERO IMPACT ON CUSTOMERS' INFRASTRUCTURE

The service is managed entirely from a centralized Web console which lets you manage the security of your Windows workstations, servers, smartphones and remote offices.

 

Control and diagnostics of IT resources

FORENSIC REPORTS

Adaptive Defense provides forensic reports and execution graphs that give you a clear view of all the events caused by malware.

You can trace the path of any attack before it was neutralized, as well as the files created and much more with heat maps available through the Web console. Identify the critical vulnerabilities in your organization and fix them.

CONTINUOUS NETWORK STATUS INFORMATION

Adaptive Defense sends immediate alerts when malware is detected on the network.

Additionally, the service's reports provide in-depth information about the location of threats, the computers infected and the actions taken by the malware.

These reports can also be sent via email and include details of the daily activity of the service.

SIEM INTEGRATION

Our service integrates with SIEM products such as QRadar or ArcSight, aggregating detailed information on the activity of all applications run on company systems

The information about security events stored on the system will let you analyze in real time behavior patterns of your employees and network trends.

For those without SIEM, Adaptive Defense optionally includes its own security event management and storage system for real-time analysis of all the collected data.

 
Need help?
 
Contact us for personalized information
 

PANDA SECURITY'S CERTIFICATIONS

  • AV comparatives
  • Virus Bulletin
 

TECHNICAL REQUIREMENTS

WEB CONSOLE (only monitoring)

AGENT

  • Operating systems (endpoints): Windows XP SP2 or later
    (Vista, Windows 7 (32-bit and 64-bit), Windows 8, Windows 8.1), Windows 10.
  • Operating systems (servers): Windows Server 2003, Windows Server 2008,
    Windows Server 2011, Windows Server 2012.
  • Internet connection (direct or via proxy)
  • More details in hardware and software requirements