x
48h OFFER
If you're already a customer of
our homeusers protection,
renew now with 50% off
RENEW NOW
x
48-HOUR OFFER
50%
RENEWALS
Home users only
RENEW AT A DISCOUNT
x
48-HOUR OFFER
50%
RENEWALS Home users only
x
EXCLUSIVE OFFER
50%
RENEWALS Home users only
RENEW AT A DISCOUNT
x
SPECIAL OFFER
If you're already a customer of
our homeusers protection,
renew now with 50% off
RENEW NOW
x
HALLOWEEN OFFER
take advantage of our
terrific discounts
BUY NOW AND GET 50% OFF
x
SPECIAL OFFER
Buy the best antivirus
at the best price
BUY NOW AND
GET 50% OFF
x
SPECIAL OFFER
Buy the best antivirus
at the best price
BUY NOW AND
GET 50% OFF
x
SPECIAL OFFER
-50%
Buy the best antivirus
at the best price
BUY NOW AND
GET 50% OFF
x
SPECIAL OFFER
-50%
Buy the best antivirus
at the best price
BUY NOW AND
GET 50% OFF
x
SPECIAL OFFER
Buy the best antivirus
at the best price
BUY NOW AND GET 50% OFF
x
UP TO
-60%
BUY NOW
x
UP TO
-60%
BUY NOW
Get Panda DOME
Premium today!
Unlimited
VPN included
Save 50%

Hello!

You’re about to visit our web page in English
Would you like to continue?

Yes, I want to visit the web page in English No, I want to visit the web page in

If this is not what you’re looking for,

Visit our Welcome Page!

Technical Support

Need help?

 

How does the anti-exploit technology included in Panda Adaptive Defense and Endpoint Protection products work?

Information applies to:

Products
Panda Adaptive DefensePanda Adaptive Defense 360Panda Adaptive Defense 360 on Aether Platform
Panda Adaptive Defense on Aether PlatformPanda Endpoint ProtectionPanda Endpoint Protection on Aether Platform
Panda Endpoint Protection PlusPanda Endpoint Protection Plus on Aether Platform

Panda Adaptive Defense 360 implements technologies to protect network computers against threatscapable of leveraging vulnerabilities in installed software. These vulnerabilities can be exploited tocause anomalous behaviors in applications, leading to security failures on customers' networks.

These exploits leverage both known and unknown (zero-day) vulnerabilities, triggering a chain ofevents (CKC, Cyber Kill Chain) that they must follow to compromise systems. Panda Adaptive Defense360 blocks this chain of events effectively and in real time, neutralizing exploit attacks and renderingthem harmless

In order to detect the vulnerability exploit techniques used by hackers, Panda Adaptive Defense 360implements new hooks in the operating system, using them to locally and continually monitor allactions taken by the processes run on users' computers. This strategy goes beyond the traditionalapproach used by other security products and consisting of searching for patterns and staticallydetecting CVE-payload pairs through signature files.

In short, Panda Adaptive Defense 360 leverages constantly-evolving technologies to provide globalanti-exploit protection against advanced vulnerability exploit techniques such as the following:

  • Attack Surface Reduction (ASR)
  • Data Execution Prevention (DEP)• Structured Exception Handling Overwrite Protection (SEHOP)
  • Null Page Security Mitigation• Heap Spray Allocation
  • Export Address Table Access Filtering (EAF)
  • Mandatory Address Space Layout Randomization (ASLR)
  • Bottom-Up ASLR Security Mitigation
  • Load Library Check - Return Oriented Programming (ROP)
Help nº- 20200218 700035 EN

Have you resolved your query with this article?

yes no

Thanks for your answer


Why didn't you find it helpful?


The instructions are too complex.
The instructions are too long.
The instructions don't work.
I'd rather have a video.
Other reasons.




Talk to a technician!

 

Business hours: Mondays-Fridays 9:00 to 18:00 CET

Outside business hours, please use the online form.





ALWAYS ONLINE TO HELP YOU TWITTER FORUM RATE US CHAT
ALWAYS ONLINE TO HELP YOU TWITTER FORUM RATE US CHAT