ADAPTIVE DEFENSE

Close the window of opportunity to viruses and other advanced threats

Protect your business against targeted attacks and advanced persistent threats

 
 

PREVENT ZERO-DAY ATTACKS AND ADVANCED PERSISTENT THREATS

Adaptive Defense protects endpoints, servers and laptops on your corporate network, as well as your road warriors, blocking applications which, due to their characteristics or behavior, are not considered goodware or safe to run.

WHY DO YOU NEED ADAPTIVE DEFENSE IF YOU ALREADY HAVE AN ANTIVIRUS IN YOUR COMPANY?

While the evolution of traditional antivirus solutions has been linear, the volume of malware has increased exponentially and attacks have become far more sophisticated.

This new trend, combined with the increasing complexity of IT environments, is allowing hackers to access companies and leave malware which then remains hidden for long periods.

We have the technology: Adaptive Defense is much more than a corporate antivirus

The new technology included in Adaptive Defense will allow you to protect your business against the 'window of opportunity for malware', which exploits the time lapse between the appearance of a new virus and its neutralization by security vendors.

 

WE’VE MADE PREVENTION THE BEST DEFENSE AGAINST TARGETED ATTACKS

VISIBILITY

Be 100% sure of the applications run in your company

Get complete visibility of the applications run on the endpoints and servers on your network, as well as any actions they take on systems.

DETECTION AND BLOCKING

Real-time prevention of targeted attacks on your company

Detect and block targeted and zero-day attacks before they enter.

 

PROTECTION AND RESPONSE BASED ON INFORMATION

Get all the information you need about attacks targeting your systems

Thanks to the forensic reports offered by Adaptive Defense, you will have all the data you need about attacks that target your systems, allowing you to analyze them and build new security barriers for your IT environment.

ATTACK PREVENTION

Isolate your business from future attacks

Block any applications that are not considered goodware, isolating your company from future attacks.

 
 

GET AN IN-DEPTH VIEW OF ADAPTIVE DEFENSE

Protection and disinfection

BASIC AND EXTENDED BLOCKING

Adaptive Defense offers two types of application blocking to armor plate your company against any IT attack:

Basic blocking mode allows the execution of applications cataloged as goodware and those yet to be categorized by the automated systems and Panda Security experts.

Extended blocking mode only permits the execution of applications classified as goodware. This is the perfect solution for companies with a 'zero risk' approach to security

PROTECTION OF VULNERABLE SYSTEMS

Endpoints and servers with operating systems that are not updated will no longer be a problem for the integrity of your IT security.

Adaptive Defense offers protection for vulnerable systems, so that even operating systems that are no longer supported by the vendor, such as Windows XP, are protected, without the need to install a traditional antivirus.

 
NO FALSE POSITIVES THANKS TO BIG DATA AND THE CLOUD

Adaptive Defense monitors all the actions that occur as a consequence of the running of any application on your company’s endpoints or servers.

This monitoring process, in conjunction with machine learning on Big Data platforms in the cloud, enables us to identify and classify the behavior of each application.

Panda Security experts also analyze any applications that are not classified automatically in order to obtain detailed knowledge of the processes being run in your organization.

In short, you can decide at any time which applications are run in your company. Adaptive Defense gives you the peace of mind that applications are 100% safe for the security of your environment. Always, and without false positives.

 

Service management

100% MANAGED SERVICE

Panda Security’s latest technologies based on machine learning and Big Data environments give Adaptive Defense the ability to automatically classify applications without end-user intervention.

ZERO IMPACT ON CUSTOMERS' INFRASTRUCTURE

The service is managed entirely from a centralized Web console which lets you manage the security of Windows endpoints and servers as well as smartphones and remote offices.

 

Control and diagnostics of IT resources

FORENSIC REPORTS

Adaptive Defense provides forensic reports and execution graphs that give you a clear view of all the events caused by malware.

You can trace the path of any attack before it was neutralized, as well as the files created and much more with heat maps available through the Web console. Identify the critical vulnerabilities in your organization and fix them.

CONTINUOUS INFORMATION ON THE NETWORK STATUS

Adaptive Defense sends immediate warnings when malware is detected on the network.

Reports provide in-depth information about the location of threats, the computers infected and the action taken by the malware.

These reports can also be sent via email and include details of the daily activity of the service.

SIEM MODULE

Our service integrates with SIEM products such as QRadar or ArcSight, aggregating detailed information on the activity of all applications run on company systems.

Information about security events stored on the system will let you analyze in real-time behavioral patterns of your employees and your network trends.

 
Need help?
 
Contact us for personalized information
 

Gartner

"There is widespread agreement that advanced attacks are bypassing our traditional signature-based security controls and persisting undetected on our systems for extended periods of time. The threat is real. You are compromised; you just don’t know it."

 

PANDA SECURITY'S CERTIFICATIONS

 

TECHNICAL REQUIREMENTS

WEB CONSOLE (only monitoring)

  • Internet connection
  • Internet Explorer 7.0 or later
  • Firefox 3.0 or later
  • Google Chrome 2.0 or later

AGENT

  • Operating systems (endpoints): Windows XP SP2 or later (Vista, Windows 7 (32-bit and 64-bit), Windows 8).
  • Operating systems (servers): Windows Server 2003, Windows Server 2008.
  • Internet connection (direct or via proxy)