Over the past months, our researchers have been hard at work building a new version of Adaptive Defense to bring users the best prevention, detection and response endpoint solution against rapidly evolving modern day cyberattacks.

This version includes our latest dynamic anti-exploit technology, a radically faster way to detect attacks at any stage of exploitation, for both known and unknown exploits, as well as enhanced forensic analysis capabilities. The dynamic anti-exploit technologies incorporated into version 2.4 are precisely designed to detect and abort attacks before trusted applications can be compromised.

Here are some of the most prominent updates that come with the new version:

1. Dynamic anti-exploit technology. Detection at the exploit stage of a cyberattack. AD and AD360 incorporate a new dynamic anti-exploit technology that prevents exploit attempts through continuous monitoring of the activity of devices, and identification of both known and unknown (zero-day) exploits.

2. Detection of malwareless/file-less attacks, and monitoring through the management console. AD and AD360 identify malicious behaviors of legitimate applications. These techniques are further strengthened in this version. These attacks will be managed just as any other detection, that is, they will be shown in the console’s dashboard and reports as malware detections.

3. Identification of computers used to propagate attacks throughout the network. Whenever a malware/PUP is detected or an unknown item is blocked, the solution will display the network computer that the infection originated from, its IP address and even the logged-in user. All this information will be part of its life cycle.

4. Greater flexibility for integration with the customer’s on-premise SIEM tool: Syslog and VPN.

5. New option for integration into customer’s operational applications, through a report with protected endpoints status details. Ability to export the life cycle detail of one or multiple detections to be analyzed as a whole. Command-line information in the lifecycle if used during the attack. (PowerShell command, etc.).

With this new version, Panda Adaptive Defense continues in its commitment to providing end users with seamless protection on the cutting edge of advanced cybersecurity solutions.