Technical Support

Need help?


How does the anti-exploit technology included in Panda Adaptive Defense and Endpoint Protection products work?

Information applies to:

Panda Adaptive DefensePanda Adaptive Defense 360Panda Adaptive Defense 360 on Aether Platform
Panda Adaptive Defense on Aether PlatformPanda Endpoint ProtectionPanda Endpoint Protection on Aether Platform
Panda Endpoint Protection PlusPanda Endpoint Protection Plus on Aether Platform

Panda Adaptive Defense 360 implements technologies to protect network computers against threatscapable of leveraging vulnerabilities in installed software. These vulnerabilities can be exploited tocause anomalous behaviors in applications, leading to security failures on customers' networks.

These exploits leverage both known and unknown (zero-day) vulnerabilities, triggering a chain ofevents (CKC, Cyber Kill Chain) that they must follow to compromise systems. Panda Adaptive Defense360 blocks this chain of events effectively and in real time, neutralizing exploit attacks and renderingthem harmless

In order to detect the vulnerability exploit techniques used by hackers, Panda Adaptive Defense 360implements new hooks in the operating system, using them to locally and continually monitor allactions taken by the processes run on users' computers. This strategy goes beyond the traditionalapproach used by other security products and consisting of searching for patterns and staticallydetecting CVE-payload pairs through signature files.

In short, Panda Adaptive Defense 360 leverages constantly-evolving technologies to provide globalanti-exploit protection against advanced vulnerability exploit techniques such as the following:

  • Attack Surface Reduction (ASR)
  • Data Execution Prevention (DEP)• Structured Exception Handling Overwrite Protection (SEHOP)
  • Null Page Security Mitigation• Heap Spray Allocation
  • Export Address Table Access Filtering (EAF)
  • Mandatory Address Space Layout Randomization (ASLR)
  • Bottom-Up ASLR Security Mitigation
  • Load Library Check - Return Oriented Programming (ROP)
Help nº- 20200218 700035 EN

Have you resolved your query with this article?

yes no

Thanks for your answer

Why didn't you find it helpful?

The instructions are too complex.
The instructions are too long.
The instructions don't work.
I'd rather have a video.
Other reasons.

Talk to a technician!


Business hours: Mondays-Fridays 9:00 to 18:00 CET

Outside business hours, please use the online form.



You’re about to visit our web page in English
Would you like to continue?

Yes, I want to visit the web page in English No, I want to visit the web page in

If this is not what you’re looking for,

Visit our Welcome Page!