Markets have a well-established life cycle.  So much so that their level of maturity determines not only the level of competition that we can expect, but also the very nature of the demands that clients can make.

And the fact is that, despite its relative youth, the cybersecurity market is extremely mature: The competition is fierce but the solutions, services, and the technology on offer are very similar, especially when it comes to traditional protection models, where there is a notable commoditization.

Nevertheless, the evolution and professionalization of cyberattacks is reaching unprecedented levels. We see over 285,000 new malware samples every day. Hacking is evolving towards new malwareless strategies that in fact already make up 49% of the cases in the world. There are new trends based on leaking and kidnapping confidential information, and government sponsored advanced attacks are ever more common.

The maturity of the market, the pressure from the competition, and the demands made by cyberthreats all mean that clients are calling for a response that is more and more perfect – a truly reliable solution.

A new vision breaks onto the market

With such a standardized market and such similar competition, cybersecurity providers are compelled to make themselves really stand out.  But with this market approach and such a threatening security context, it is not enough to do things the same way they’ve always been done. For clients, it’s not enough to simply get all kinds of tools to cover up any possible security gaps.

Efforts must be focused on what is really important.  And the endpoint is where people’s, companies’, and governments’ critical information is stored and processed.  Work stations and servers must, therefore, be defended. Everything that happens within the corporate network must be controlled, and every effort must be made to reduce the attack surface to the absolute minimum.

Panda met the needs of its clients and of the market in general over the last 6 years in order to design a visionary strategy that the rest of the industry is working to adapt to today.  At that moment, Panda started to differentiate itself by evolving its strategies, reinforcing its development teams, and reinventing cyber-defense models to guarantee the maximum level of protection that had ever been seen.

A disruptive model based on monitoring, registering and classifying absolutely every active process on every computer on the corporate network. This is how Panda Adaptive Defense was born. A cybersecurity suite that incorporates Endpoint Protection and Endpoint Detection & Response (EDR) with 100% Attestation and Threat Hunting & Investigation services.  This combination of solutions and services provides a detailed overview of all activities on every endpoint, total control of running processes, and reduction of the attack surface.

Certification of the model

Finally, this evolution is being rewarded by the market, with an exponential growth in sales and market share; by analysts, with their express recognition and positioning on comparison tests; and even by public institutions, with the numerous official certifications that the company is receiving.

These endorsements certify calibrated guarantees of security, high performance standards and, above all, absolute trust in the capacity, functionalities, and capabilities of Panda Security’s solutions.

In this light, Panda Security emerged as the leading European vendor for EDR systems, with fully European technology, solutions, cloud platform, shareholders, and headquarters.

This makes Panda Adaptive Defense the only solution with the certification “Common Criterial EAL-2”; the  Centro Criptológico Nacional (National Cryptology Center) “Qualified IT Security Product” qualification; and the “High ENS (National Security Framework)” classification.

As such, Panda and its solutions are completely aligned with the European Parliament’s proposals that were approved in motion A8-0189/2018, placing them as the ideal candidates to enter the plan for a European Cybersecurity Certification, that was approved yesterday by the European Parliament.

Who says this?

The Centro CriptolĂłgico Nacional (National Cryptology Center, CCN) is the body responsible for coordinating the action of the various Government agencies that use encryption methods and procedures, guaranteeing the security of information technology in that area, reporting on coordinated acquisition of cryptological material, and training government staff who are specialized in this field.

Gartner is the leading consultancy company when it comes to questions such as, what technological trends are making a difference? Or, which of the different manufacturers’ product or solution is at the forefront? This is why their Magic Quadrant is considered to be one of the essential analyses of the sector.  Where Panda Security is recognized as a visionary on the chart for Endpoint Protection Platforms.

AV- Comparatives is an independent laboratory that tests and evaluates antivirus software, regularly publishing graphs and reports on the manufacturers that participate in its tests. Over the course of 2017, Panda Security achieved maximum levels of protection in the organization’s Real-World Protection Test, leading it to take home that year’s Gold Award for this test.