Call a Specialist Today! 855-958-0756

Panda Adaptive Defense 360
Find the Answer, Solve the Problem


Panda Security is now a part of WatchGuard Technologies

Panda Security is now a part of WatchGuard Technologies, please visit our WatchGuard Technologies website to learn more about this product!

 

Overview:

Complete endpoint defense integrating protection, detection, response and remediation for all types of threats in a single solution.

Panda Adaptive Defense 360 is the first and only cyber-security solution to combine the most effective traditional antivirus and the latest advanced protection technology with the ability to classify all running processes.

Adaptive Defense 360 is a detection and response service that can accurately classify every process on all your company's endpoints, allowing only legitimate programs to run.

Adaptive Defense 360 relies on a a new security model based on three principles:

Continuous monitoring of all processes on a company’s computers and servers.

Continuous monitoring of all processes on a company’s computers and servers.

Automatic classification using Machine Learning on our Big Data platform in the cloud.

Automatic classification using Machine Learning on our Big Data platform in the cloud.

Technical experts who analyze all processes that are not classified automatically, to evaluate the behavior of everything that runs on your systems.

Technical experts who analyze all processes that are not classified automatically, to evaluate the behavior of everything that runs on your systems.

Defending the endpoint against attack is hard. Protection must include a wide range of defenses including traditional antivirus/anti-malware, personal firewall, Web & email filtering and device control. And, any defense must provide additional safeguards against difficult-to-detect zero-day and targeted attacks. Up to now, IT has needed to acquire and maintain a number of different products from different vendors to defend the endpoint.

Adaptive Defense 360 is the first and only offering to combine Endpoint Protection (EPP) and Endpoint Detection & Response (EDR) capabilities into a single solution. Adaptive Defense 360 also automates capabilities reducing the burden on IT. Adaptive Defense 360 starts with Panda's best-of-breed EPP solution which includes Simple and centralized security, Remedial actions, Real-time monitoring and reports, Profile-based protection, Centralized device control, and Web monitoring and Filtering.

Window of Opportunity

However, that is only the beginning. The malware and IT security environment has undergone major changes in terms of volume and sophistication. With over 200,000 new viruses appearing every day, and the sophistication of techniques for penetrating defenses and hiding malware, corporate networks are more vulnerable than ever to zero-day and targeted attacks.

Traditional Endpoint Protection solutions are efficient at blocking known malware by using detection techniques based on signature files and heuristic algorithms. However, they are no defense against zero-day and targeted attacks that take advantage of the 'window of opportunity for malware,' the time lapse between the appearance of new malware and the release of the antidote by security companies. An increasing gap that is exploited by hackers to get viruses, ransomware, Trojans and other types of malware into corporate networks. Such increasingly common threats can encrypt confidential documents and demand a ransom, or simply collect sensitive data for industrial espionage.

Adaptive Defense is Panda's solution to these types of attacks. Adaptive Defense provides an EDR service that can accurately classify every application running in an organization, only allowing legitimate programs to run. The EDR capabilities of Panda Adaptive Defense 360 relies on a security model based on three principles: continuous monitoring of applications on a company's computers and servers, automatic classification using machine learning on our Big Data platform in the cloud, and finally, our technical experts analyze those applications that haven't been classified automatically to be certain of the behavior of everything that is run on the company's systems.

Adaptive Defense 360 Diagram

These capabilities are now combined with the best-of-breed EPP solution from Panda, closing the cycle of the adaptive malware protection, which now includes automated prevention, detection, forensics and remediation.

Are you keeping your business data secure?

Confidential data, accounting systems, passwords, customer databases... Bear in mind that eventually someone will try to steal these things. The real question is, will you be able to stop it? Panda Adaptive Defense 360 provides you with a genuine answer to your needs.

With Adaptive Defense 360, we monitor and classify all YOUR software to make sure we discover and stop all malware in YOUR systems.

Adaptive Defense 360 provides automated remediation, real-time monitoring and reports, profile-based protection, centralized control of devices, as well as Web monitoring and filtering.

Features:

Complete, Robust Protection Guaranteed

Panda Adaptive Defense 360 offers two operational modes:

  • Standard Mode allows applications classified as goodware to run, as well as those that are yet to be cataloged by the automated systems and Panda Security.
  • Extended Mode only allows the execution of goodware.
  • Extended blocking is the ideal form of protection for companies with a ‘zero risk’ approach to security.

Forensic Information

  • Execution event graphs give a clear view of all events caused by malware.
  • Get visual information through heat maps on the destination of malware communications, files created and much more
  • Identify and locate the software vulnerabilities on your network.

Full Antivirus Capabilities

Adaptive Defense 360 includes Endpoint Protection capabilities, offering:

  • Remediation actions.
  • Centralized device control: Prevent malware entry and data loss by blocking certain types of devices.
  • Web monitoring and filtering.
  • Antivirus and anti-spam for Exchange Server.
  • Endpoint firewall, and much more.

100% Automated Service
100% Automated Service

Forget about having to invest in technical personnel to deal with quarantines or suspicious files or disinfect and restore infected computers. Adaptive Defense 360 automatically classifies all applications using Machine Learning techniques in our Big Data environments, constantly supervised by our PandaLabs technicians.

Continuous Network Status Information
Continuous Network Status Information

Get alerts as soon as any malware is identified on the network, with detailed information on its location, the devices affected and the type of malware. You will also get email reports about the day-to-day activity of the service.

SIEM Available
SIEM Available

Adaptive Defense 360 integrates with SIEM solutions to provide detailed data on the activity of all applications run on your systems. For those without SIEM, Adaptive Defense 360 optionally includes its own security event management and storage system for real-time analysis of all the collected data.

Benefits:

Complete and Robust Protection Guaranteed
Complete and Robust Protection Guaranteed

Panda Adaptive Defense 360 offers two operational modes:

  • Standard mode allows all applications cataloged as goodware to be run, along with the applications that are yet to be cataloged by Panda Security and the automated systems.
  • Extended mode only allows the running of goodware. This is the ideal form of protection for companies with a 'zerorisk' approach to security.

Forensic Information
Forensic Information

  • View execution event graphs to gain a clear understanding of all events caused by malware.
  • Get visual information through heat maps on the geographical source of malware connections, files created and much more.
  • Locate software with known vulnerabilities installed on your network.

Compatible with Traditional Antivirus Solutions
Compatible with Traditional Antivirus Solutions

Adaptive Defense can coexist with traditional antivirus solutions, and take the role of a corporate tool capable of blocking all types of malware, including targeted and zeroday attacks that such traditional solutions are unable to detect.

Protection for Vulnerable Operating Systems and Applications
Protection for Vulnerable Operating Systems and Applications

Systems such as Windows XP, which are no longer supported by the developer and are therefore unpatched and vulnerable, become easy prey for zero-day and new generation attacks.

Moreover, vulnerabilities in applications such as Java, Adobe, Microsoft Office and browsers are exploited by 90% of malware.

The vulnerability protection module in Adaptive Defense 360 uses contextual and behavioral rules to ensure companies can work in a secure environment even if they have systems that are not updated.

Full EPP Capabilities
Full EPP Capabilities

Adaptive Defense 360 integrates Panda Endpoint Protection Plus, the most sophisticated EPP solution from Panda, thus providing full EPP capabilities, including:

  • Remedial actions
  • Centralized device control: Prevent malware entry and data loss by blocking device types
  • Web monitoring and filtering
  • Exchange server antivirus and anti-spam
  • Endpoint Firewall, and many others...

Continuous Information on Network Status
Continuous Status Information on all Endpoints in the Network

  • Get immediate alerts the moment that malware is identified on the network, with a comprehensive report detailing the location, the computers infected, and the action taken by the malware.
  • Receive reports via email on the daily activity of the service.

SIEM Available
SIEM Available

Adaptive Defense 360 integrates with SIEM solutions to provide detailed data on the activity of all applications run on your systems.

For clients without SIEM, Adaptive Defense 360 includes its own system for storing and managing security events to analyze all the information collected in real-time.

100% Managed Service
100% Managed Service

Forget about having to invest in technical personnel to deal with quarantine or suspicious files or disinfect and restore infected computers. Adaptive Defense 360 classifies all applications automatically thanks to machine learning in our big data environments under the continuous supervision of PandaLabs' experts.

Technical Requirements:


Technical Requirements
Web Console (only monitoring)
  • Internet connection
  • Internet Explorer 7.0 or later
  • Firefox 3.0 or later
  • Google Chrome 2.0 or later
Agent
  • Operating systems (workstations): Windows XP SP2 and later, Vista, Windows 7, 8 & 8.1
  • Operating systems (servers): Windows 2003 Server, Windows 2008, Windows Server 2012
  • Internet connection (direct or through a proxy)
Partially Supported (only EPP)
  • Linux, MAC OS X and Android

Compare:


Functionality
Functionality extended in other Panda endpoint solutions.
Full Functionality
Full functionality.
Functionality. Only in Aether-based solutions.
Functionality extended in other Panda endpoint solutions. Only in Aether-based solutions.
Full functionality. Only in Aether-based solutions.
Full functionality. Only in Aether-based solutions.

  Adaptive Defense 360 Adaptive Defense Endpoint Protection Endpoint Protection Plus Systems Management Fusion Fusion 360
Adaptive Defense 360 Adaptive Defense Endpoint Protection Endpoint Protection Plus Systems Management Fusion Fusion 360
Protection
Protection against known and zero-day malware Full Functionality Full Functionality Functionality Functionality   Functionality Full Functionality
Protection against known and zero-day ransomware Full Functionality Full Functionality Functionality Functionality   Functionality Full Functionality
Protection against known and zero-day exploits Full Functionality Full Functionality Functionality Functionality   Functionality Full Functionality
Anti-spyware, anti-phishing protection, etc. Full Functionality Full Functionality Full Functionality Full Functionality   Full Functionality Full Functionality
Protection for multiple attack vectors (Web, email, network, devices) Full Functionality Functionality Full Functionality Full Functionality   Full Functionality Full Functionality
Traditional protection with generic and optimized signatures Full Functionality Full Functionality Full Functionality Full Functionality   Full Functionality Full Functionality
Protection against Advanced Persistent Threats (APT) Full Functionality Full Functionality         Full Functionality
Managed service: Classification of 100% of applications before execution (1*) Full Functionality Full Functionality         Full Functionality
Managed service: Threat Hunting (2*) Full Functionality Full Functionality         Full Functionality
Queries to Panda’s cloud-based collective intelligence Full Functionality Full Functionality Full Functionality Full Functionality   Full Functionality Full Functionality
Behavioral blocking and IoA detection Full Functionality Full Functionality Functionality Functionality   Functionality Full Functionality
Personal and managed firewall Full Functionality   Full Functionality Full Functionality   Full Functionality Full Functionality
IDS / HIDS Full Functionality   Full Functionality Full Functionality   Full Functionality Full Functionality
Ability to block unknown and unwanted applications Full Functionality Full Functionality         Full Functionality
Device control Full Functionality   Full Functionality Full Functionality   Full Functionality Full Functionality
URL filtering by category (Web browsing monitoring) Full Functionality   Full Functionality     Full Functionality Full Functionality
Content, Virus and Spam filtering for Exchange Server Full Functionality   Full Functionality     Full Functionality Full Functionality
Built-in antivirus protection for Exchange Server Full Functionality   Full Functionality     Full Functionality Full Functionality
Built-in anti-spam protection for Exchange Server Full Functionality   Full Functionality     Full Functionality Full Functionality
Monitoring
Advanced endpoint security Full Functionality Full Functionality         Full Functionality
Cloud-based continuous monitoring of all process activity Full Functionality Full Functionality         Full Functionality
Data retention for one year for retrospective attack investigation Full Functionality Full Functionality         Full Functionality
Detection
Detection of compromised trusted applications Full Functionality Full Functionality         Full Functionality
Managed service: Classification of 100% of applications during and after execution (1*) Full Functionality Full Functionality         Full Functionality
Fully configurable and instant security risk alerts Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.   Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.
Containment
Real-time computer isolation from the cloud console Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.         Full functionality. Only in Aether-based solutions.
Response and remediation
Ability to roll back and remediate the actions committed by attackers Full Functionality Full Functionality Full Functionality Full Functionality   Full Functionality Full Functionality
Centralized quarantine Full Functionality Full Functionality Full Functionality Full Functionality   Full Functionality Full Functionality
Automatic analysis and disinfection Full Functionality Full Functionality Full Functionality Full Functionality   Full Functionality Full Functionality
Investigation
Managed service: Threat Hunting (2*) Full Functionality Full Functionality         Full Functionality
Incident graphs and lifecycle information available from the Web console Full Functionality Full Functionality         Full Functionality
Ability to export lifecycle information for local analysis Full Functionality Full Functionality         Full Functionality
Advanced Visualization Tool (add-on) Full Functionality Full Functionality         Full Functionality
Discovery and monitoring of unstructured personal data across endpoints (add-on) Full Functionality Full Functionality         Full Functionality
Attack surface reduction
Information about each computer's hardware and software components Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.   Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.
Information about the Microsoft updates installed on endpoints Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.   Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.
Real-time information about the status of all protections and communications Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.   Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.
Unattended, automatic updates Full Functionality Full Functionality Full Functionality Full Functionality   Full Functionality Full Functionality
Automatic discovery of unprotected endpoints Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.   Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.
Ability to immediately protect unprotected endpoints remotely Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.   Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.
Panda native proxy to support endpoints with no Internet connection Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.   Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.
Endpoint security management
Centralized cloud-based console Full Functionality Full Functionality Full Functionality Full Functionality Full Functionality Full Functionality Full Functionality
Settings inheritance between groups and endpoints Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.   Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.
Ability to configure and apply settings on a group basis Full Functionality Full Functionality Full Functionality Full Functionality   Full Functionality Full Functionality
Ability to configure and apply settings on a per-endpoint basis Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.   Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.
Real-time deployment of settings from the console to endpoints Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.   Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.
Security management based on endpoint views and dynamic filters Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.   Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.
Ability to schedule and perform tasks on endpoint views Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.   Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.
Ability to assign preconfigured roles to console users Full Functionality Full Functionality Full Functionality Full Functionality   Full Functionality Full Functionality
Ability to assign custom permissions to console users Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.   Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.
User activity auditing Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.   Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.
Installation via MSI packages, download URLs, and emails sent to end users Full Functionality Full Functionality Full Functionality Full Functionality   Full Functionality Full Functionality
On-demand and scheduled reports at different levels and with multiple granularity options Full Functionality Full Functionality Full Functionality Full Functionality   Full Functionality Full Functionality
Security KPIs and management dashboards Full Functionality Full Functionality Full Functionality Full Functionality   Full Functionality Full Functionality
System status reports at different levels and with multiple granularity options Full Functionality Full Functionality Full Functionality Full Functionality Full Functionality Full Functionality Full Functionality
Device inventory and audits         Full Functionality Full Functionality Full Functionality
Agent and agentless monitoring of devices         Full Functionality Full Functionality Full Functionality
Patch management         Full Functionality Full Functionality Full Functionality
Centralized software installation         Full Functionality Full Functionality Full Functionality
Non-disruptive remote access         Full Functionality Full Functionality Full Functionality
Remote Desktop         Full Functionality Full Functionality Full Functionality
Built-in chat         Full Functionality Full Functionality Full Functionality
Task automation and scripting         Full Functionality Full Functionality Full Functionality
Component store - ComStore         Full Functionality Full Functionality Full Functionality
Ticketing/Help Desk         Full Functionality Full Functionality Full Functionality
Modules
Panda Data Control integration Full Functionality Full Functionality         Full Functionality
Advanced Reporting Tool integration Full Functionality Full Functionality         Full Functionality
SIEM integration Full Functionality Full Functionality         Full Functionality
Panda Patch Management Full Functionality Full Functionality Full Functionality Full Functionality   Full Functionality Full Functionality
Panda Full Encryption inregration Full Functionality Full Functionality Full Functionality Full Functionality   Full Functionality Full Functionality
High availability service Full Functionality Full Functionality Full Functionality Full Functionality Full Functionality Full Functionality Full Functionality
Host platform certifications ISO27001, SAS 70 ISO27001, SAS 70 ISO27001, FISMA, SAS70, PCI DSS
Supported operating systems
Supports Windows Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.
Suppots Exchange Full Functionality   Full Functionality   Full Functionality Full Functionality Full Functionality
Supports macOS X Full Functionality   Full Functionality Full Functionality Full Functionality Full Functionality Full Functionality
Supports Linux Full Functionality   Full Functionality Full Functionality Full Functionality Full Functionality Full Functionality
Supports Android Full Functionality   Full Functionality Full Functionality Full Functionality Full Functionality Full Functionality
Supports iOS         Full Functionality Full Functionality Full Functionality
Support for virtual environments - persistent and non-persistent (VDI)** Full Functionality Full Functionality Full Functionality Full Functionality   Full Functionality Full Functionality

* Panda Fusion is a bundle of Panda Endpoint Protection Plus and Panda Systems Management. Panda Fusion 360 is the combination of Panda Systems Management and Panda Adaptive Defense 360 that are sold separately
** Compatible systems with the following types of virtual machines: VMWare Desktop, VMware Server, VMware ESX, VMware ESXi, Citrix XenDesktop, XenApp, XenServer, MS Virtual Desktop y MS Virtual Servers. Panda Adaptive Defense 360 & Panda Fusion 360 solutions are compatible with Citrix Virtual Apps, Citrix Desktops 1906 & Citrix Workspace App for Windows, Panda Securtity has been verified as Citrix Ready partner.
1* 100% Classification Service.
2* Threat Hunting and Investigation Service

Documentation:

Download the Panda Adaptive Defense 360 Datasheet (.PDF)