YOU’RE NOT VIEWING PANDA SECURITY USA. CLICK TO IMPROVE YOUR EXPERIENCE
VISIT PANDA SECURITY USA
x
48h OFFER
If you're already a customer of
our homeusers protection,
renew now with 50% off
RENEW NOW
x
48-HOUR OFFER
50%
RENEWALS
Home users only
RENEW AT A DISCOUNT
x
SPECIAL OFFER
If you're already a customer of
our homeusers protection,
renew now with 50% off
RENEW NOW
x
HALLOWEEN OFFER
take advantage of our
terrific discounts
BUY NOW AND GET 50% OFF
x
SPECIAL OFFER
Buy the best antivirus
at the best price
BUY NOW AND GET 50% OFF
x
SPECIAL OFFER
Buy the best antivirus
at the best price
BUY NOW AND GET 50% OFF
x
UP TO
-60%
BUY NOW
x
UP TO
-60%
BUY NOW

Technical Support

Need help?

 

How does the anti-exploit technology included in Panda Adaptive Defense and Endpoint Protection products work?

Information applies to:

Products
Panda Adaptive DefensePanda Adaptive Defense 360Panda Adaptive Defense 360 on Aether Platform
Panda Adaptive Defense on Aether PlatformPanda Endpoint ProtectionPanda Endpoint Protection on Aether Platform
Panda Endpoint Protection PlusPanda Endpoint Protection Plus on Aether Platform

Panda Adaptive Defense 360 implements technologies to protect network computers against threats capable of leveraging vulnerabilities in installed software. These vulnerabilities can be exploited to cause anomalous behaviors in applications, leading to security failures on customers' networks.

Exploit threats leverage both known and unknown (zero-day) vulnerabilities, triggering a chain of events (CKC, Cyber Kill Chain) that they must follow to compromise systems. Panda Adaptive Defense 360 blocks this chain of events effectively and in real time, neutralizing exploit attacks and rendering them harmless.

In order to achieve these high levels of protection and immediate response, Panda Adaptive Defense 360 implements new hooks in the operating system, using them to locally and continually monitor all actions taken by the processes run on users' computers.

This strategy allows Panda Adaptive Defense 360 to detect the exploit techniques used by hackers, going beyond the traditional approach used by other security products and consisting of searching for patterns and statically detecting CVE-payload pairs through signature files.

In short, Panda Adaptive Defense 360 leverages constantly-evolving technologies to provide global anti-exploit protection against advanced vulnerability exploit techniques such as the following:

  • Attack Surface Reduction (ASR)
  • Data Execution Prevention (DEP)
  • Structured Exception Handling Overwrite Protection (SEHOP)
  • Null Page Security Mitigation
  • Heap Spray Allocation
  • Export Address Table Access Filtering (EAF)
  • Mandatory Address Space Layout Randomization (ASLR)
  • Bottom-Up ASLR Security Mitigation
  • Load Library Check – Return Oriented Programming (ROP)
  • Memory Protection Check – Return Oriented Programming (ROP)
  • Caller Checks – Return Oriented Programming (ROP)
  • Simulate Execution Flow – Return Oriented Programming (ROP)
  • Stack Pivot – Return Oriented Programming (ROP)
  • EternalBlue
  • Process Doppelgänging
Help nº- 20190408 700035 EN

Have you resolved your query with this article?

yes no

Thanks for your answer


Why didn't you find it helpful?


The instructions are too complex.
The instructions are too long.
The instructions don't work.
I'd rather have a video.
Other reasons.




Talk to a technician!

 

Business hours: Mondays-Fridays 9:00 to 18:00 CET

Outside business hours, please use the online form.





ALWAYS ONLINE TO HELP YOU TWITTER FORUM RATE US CHAT
ALWAYS ONLINE TO HELP YOU TWITTER FORUM RATE US CHAT