x
48h OFFER
If you're already a customer of
our homeusers protection,
renew now with 50% off
RENEW NOW
x
48-HOUR OFFER
50%
RENEWALS
Home users only
RENEW AT A DISCOUNT
x
48-HOUR OFFER
50%
RENEWALS Home users only
x
EXCLUSIVE OFFER
50%
RENEWALS Home users only
RENEW AT A DISCOUNT
x
SPECIAL OFFER
If you're already a customer of
our homeusers protection,
renew now with 50% off
RENEW NOW
x
HALLOWEEN OFFER
take advantage of our
terrific discounts
BUY NOW AND GET 50% OFF
x
SPECIAL OFFER
Buy the best antivirus
at the best price
BUY NOW AND
GET 50% OFF
x
SPECIAL OFFER
Buy the best antivirus
at the best price
BUY NOW AND
GET 50% OFF
x
SPECIAL OFFER
-50%
Buy the best antivirus
at the best price
BUY NOW AND
GET 50% OFF
x
SPECIAL OFFER
-50%
Buy the best antivirus
at the best price
BUY NOW AND
GET 50% OFF
x
SPECIAL OFFER
Buy the best antivirus
at the best price
BUY NOW AND GET 50% OFF
x
UP TO
-60%
BUY NOW
x
UP TO
-60%
BUY NOW

Hello!

You’re about to visit our web page in English
Would you like to continue?

Yes, I want to visit the web page in English No, I want to visit the web page in

If this is not what you’re looking for,

Visit our Welcome Page!

Technical Support

Need help?

 

What is the layer detection model of Panda Adaptive Defense?

Information applies to:

Products
Panda Adaptive DefensePanda Adaptive Defense 360
Panda Adaptive Defense 360 on Aether PlatformPanda Adaptive Defense on Aether Platform

The proliferation of malware attacks directed at the endpoint through techniques such as social engineering, forces the user to take precautions to protect their data and those of their company.

One of the main infection vectors are spam campaigns with attachments. The spam campaigns used by the ransomware are usually carried out by messages containing compressed attachments (.zip) that include the malicious code that the user must execute. These files can be of type PE (usually a file with an .exe extension), a script (.js, .vbs, .wsf, etc.) or a Word document (compressed or not). Another quite successful strategy for cyber-criminals is to include a link in the email that takes the victim to a Web page from which to download the compressed file. You can see detailed information in the Panda Media Center post: Tails from Ransomware: Spam campaigns

All Panda Adaptive Defense products include a layer detection model that ensures the protection of the endpoint against all types of attacks.

The Panda Adaptive Defense layer detection model
Layer 1: Heuristic and signature detection
The first level of defense is composed of traditional or static technologies. The antivirus engine uses information stored in the signature file, as well as information available in the Collective Intelligence (Cloud) to perform the relevant analysis when receiving a document or when accessing a compromised website and download the malicious JS. In the event that the traditional technology does not identify both files as malicious, the next layer of protection would come into play.

Layer 2: Contextual Engine
In this layer, the dynamic detection technologies are triggered when the element is executed. In this case, the detection method takes into account the execution context (contextual technologies) or the origin of it (hardening rules).

Layer 3: Service Classification of 100% of the processes
In this layer of protection, it is the attestation service, which guarantees the classification by the Panda Security laboratory of all the PEs identified, giving rise to models which will only allow the execution of elements provided they have been classified by our laboratory as reliable and based upon the Advanced Protection configuration set to LOCK mode.

Layer 4: Anti-exploit technology
On the other hand, through anti-exploit technologies, the manipulation in the memory of legitimate processes is avoided, thus avoiding the exploitation of vulnerabilities that could compromise the computer.


Related information

For detailed information on how the technologies and managed services integrated in Panda Adaptive Defense 360 work together, read Panda Adaptive Defense 360 technologies - Managed Detection, Managed Mitigation white paper.

Help nº- 20191121 700082 EN

Have you resolved your query with this article?

yes no

Thanks for your answer


Why didn't you find it helpful?


The instructions are too complex.
The instructions are too long.
The instructions don't work.
I'd rather have a video.
Other reasons.




Talk to a technician!

 

Business hours: Mondays-Fridays 9:00 to 18:00 CET

Outside business hours, please use the online form.





ALWAYS ONLINE TO HELP YOU TWITTER FORUM RATE US CHAT
ALWAYS ONLINE TO HELP YOU TWITTER FORUM RATE US CHAT