Call a Specialist Today! 855-958-0756

Panda Adaptive Defense
Find the Answer, Solve the Problem


Panda Security is now a part of WatchGuard Technologies

Panda Security is now a part of WatchGuard Technologies, please visit our WatchGuard Technologies website to learn more about this product!

 

Overview:

Panda's endpoint detection and response (EDR) service is the best cyber-security solution to protect your business against targeted attacks and advanced persistent threats.

Adaptive Defense protects every endpoint, server, laptop and road warrior on your corporate network, detecting and blocking the malware and unusual behavior that other products on the market are unable to stop.

Adaptive Defense

The malware and IT security panorama has undergone a major change in terms of volume and sophistication. There has been an exponential increase in the number of viruses in circulation (around 200,000 new viruses appear every day), and new techniques for penetrating defenses and hiding malware are allowing threats to remain on corporate networks for long periods.

Window of Opportunity

At the same time, IT environments have become increasingly complex, making management more difficult and systems more vulnerable.

Yet traditional antivirus solutions are out of step with the reality. Their linear evolution continues to use outdated detection techniques based on signature files and heuristic algorithms. This means that the results are inaccurate, i.e., that malware can go undetected and false positives are generated.

This discrepancy has led to what has been dubbed the 'window of opportunity for malware': the time lapse between the appearance of a new virus and the release of the antidote by security companies. An increasing gap that is exploited by hackers to get viruses, ransomware, Trojans and other types of malware into corporate networks. Such increasingly common threats can encrypt confidential documents and demand a ransom, or simply collect sensitive data for industrial espionage.

Governments, banks and other large companies are bearing the brunt of attacks that traditional antivirus solutions are simply not detecting in time. Our Research Department has analyzed millions of virus samples and the best antivirus products on the market to reveal that 18 percent of malware is undetected in the first 24 hours after it is released, and even after three months, these traditional solutions are still unable to detect 2 percent of malware.

The solution to this situation is Adaptive Defense: a Panda Security service which can accurately classify every application running in your organization, only allowing legitimate programs to run.

To achieve this, we have been working for five years on a new security model based on three principles: continuous monitoring of applications on a company's computers and servers, automatic classification using machine learning on our Big Data platform in the cloud, and finally, our technical experts analyze those applications that haven't been classified automatically to be certain of the behavior of everything that is run on the company's systems.

Continuous Endpoint Visibility and Big Data Analytics in our Cloud Services

Why do you need Adaptive Defense if you already have an antivirus in your company?

The volume of malware has increased exponentially and attacks have become far more sophisticated.

This new trend, combined with the increasing complexity of IT environments, is allowing hackers to access companies and leave malware which then remains hidden for long periods.

Traditional antivirus solutions are efficient against commodity malware, but they fail to prevent the new generation of advanced threats and targeted attacks.

Adaptive Defense is an endpoint detection and response (EDR) service that can accurately classify every process running in an organization, only allowing legitimate programs to run.

The new technology included in Adaptive Defense will allow you to protect your business against targeted and zero-day attacks which exploit the time lapse between the appearance of a new virus and its neutralization by security vendors.

We've made prevention the best defense against targeted attacks

Visibility
Get complete visibility into the applications run on your company's endpoints and servers, as well as every action carried out on your systems.

Detection and Blocking
Detect and block targeted and zero-day attacks in real time before they occur.

Protection and Response Based on Information
Thanks to the forensic reports provided by Adaptive Defense, you will have all the data you need about attacks targeting your systems, allowing you to analyze them and build new security barriers for your IT environment.

Attack Prevention
Block any applications that are not considered goodware, isolating your company from future attacks.

Features:

Protection and Disinfection

Basic and extended blocking

Adaptive Defense provides two types of application blocking to secure your company against any IT attack:

Basic blocking allows applications classified as goodware to run, as well as those that are yet to be cataloged by Panda Security's automated systems and malware experts.

Extended blocking only permits the execution of applications classified as goodware. This is the ideal form of protection for companies with a ‘zero risk’ approach to security.

Protection for vulnerable systems

Endpoints and servers with operating systems that are not updated will no longer be a problem for the integrity of your IT security.

Adaptive Defense offers protection for vulnerable systems with operating systems no longer supported by the vendor, such as Windows XP, without the need to install a traditional antivirus.

Protection for vulnerable systems

No false positives thanks to big data and the cloud

Adaptive Defense monitors all the actions that occur as a consequence of the running of any application on your company’s workstations and servers.

This monitoring process, in conjunction with Machine Learning on Big Data platforms in the cloud, enables us to identify and classify the behavior of every application.

Panda Security experts also analyze any applications that are not classified automatically in order to obtain detailed knowledge of the processes being run in your organization.

In short, you can decide at any time which applications are run in your company. Adaptive Defense will give you the peace of mind that any application run in your organization is 100% safe for the security of your environment. Always, and without false positives.

Service ManagementService Management

100% Managed Service

Panda Security’s latest technologies based on Machine Learning and Big Data environments give Adaptive Defense the ability to automatically classify applications without end-user intervention.

Zero impact on customers' infrastructure

The service is managed entirely from acentralized Web console which lets you manage the security of your Windows workstations, servers, smartphones and remote offices.

Control and Diagnostics of IT Resources

Forensic Reports

Adaptive Defense provides forensic reports and execution graphs that give you a clear view of all the events caused by malware.

You can trace the path of any attack before it was neutralized, as well as the files created and much more with heat maps available through the Web console. Identify the critical vulnerabilities in your organization and fix them.

Continuous Network Status Information

Adaptive Defense sends immediate alerts when malware is detected on the network.

Additionally, the service's reports provide in-depth information about the location of threats, the computers infected and the actions taken by the malware.

These reports can also be sent via email and include details of the daily activity of the service.

SIEM Integration

Our service integrates with SIEM products such as QRadar or ArcSight, aggregating detailed information on the activity of all applications run on company systems

The information about security events stored on the system will let you analyze in real time behavior patterns of your employees and network trends.

For those without SIEM, Adaptive Defense optionally includes its own security event management and storage system for real-time analysis of all the collected data.

Control and Diagnostics of IT Resources

Benefits:

Complete and Robust Protection Guaranteed
Complete and Robust Protection Guaranteed

Panda Adaptive Defense offers two operational modes:

  • Standard mode allows all applications cataloged as goodware to be run, along with the applications that are yet to be cataloged by Panda Security and the automated systems.
  • Extended mode only allows the running of goodware. This is the ideal form of protection for companies with a 'zerorisk' approach to security.

Forensic Information
Forensic Information

  • Execution event graphs give a clear view of all events caused by malware.
  • Get visual information through heat maps on the geographical source of malware connections, files created and much more.
  • Locate software with known vulnerabilities installed on your network.

Compatible with Traditional Antivirus Solutions
Compatible with Traditional Antivirus Solutions

Adaptive Defense can coexist with traditional antivirus solutions, and take the role of a corporate tool capable of blocking all types of malware, including targeted and zeroday attacks that such traditional solutions are unable to detect.

Protection for Vulnerable Operating Systems and Applications
Protection for Vulnerable Operating Systems and Applications

Systems such as Windows XP, which are no longer supported by the developer and are therefore unpatched and vulnerable, become easy prey for zero-day and new generation attacks.

Moreover, vulnerabilities in applications such as Java, Adobe, Microsoft Office and browsers are exploited by 90% of malware.

The vulnerability protection module in Adaptive Defense uses contextual and behavioral rules to ensure companies can work in a secure environment even if they have systems that are not updated.

Continuous Information on Network Status
Continuous Information on Network Status

  • Get immediate alerts the moment that malware is identified on the network, with a comprehensive report detailing the location, the computers infected, and the action taken by the malware.
  • Receive reports via email on the daily activity of the service.

SIEM Available
SIEM Available

Adaptive Defense integrates with SIEM solutions to provide detailed data on the activity of all applications run on your systems.

For clients without SIEM, Adaptive Defense includes its own system for storing and managing security events to analyze all the information collected in real-time.

100% Managed Service
100% Managed Service

Forget about having to invest in technical personnel to deal with quarantine or suspicious files or disinfect and restore infected computers. Adaptive Defense classifies all applications automatically thanks to machine learning in our big data environments under the continuous supervision of PandaLabs' experts.

Technical Requirements:


Technical Requirements
Web Console (only monitoring)
  • Internet connection
  • Internet Explorer 7.0 or later
  • Firefox 3.0 or later
  • Google Chrome 2.0 or later
Agent
  • Operating systems (workstations): Windows XP SP2 and later, Vista, Windows 7, 8 & 8.1
  • Operating systems (servers): Windows 2003 Server, Windows 2008, Windows Server 2012
  • Internet connection (direct or through a proxy)

Compare:


Functionality
Functionality extended in other Panda endpoint solutions.
Full Functionality
Full functionality.
Functionality. Only in Aether-based solutions.
Functionality extended in other Panda endpoint solutions. Only in Aether-based solutions.
Full functionality. Only in Aether-based solutions.
Full functionality. Only in Aether-based solutions.

  Adaptive Defense 360 Adaptive Defense Endpoint Protection Endpoint Protection Plus Systems Management Fusion Fusion 360
Adaptive Defense 360 Adaptive Defense Endpoint Protection Endpoint Protection Plus Systems Management Fusion Fusion 360
Protection
Protection against known and zero-day malware Full Functionality Full Functionality Functionality Functionality   Functionality Full Functionality
Protection against known and zero-day ransomware Full Functionality Full Functionality Functionality Functionality   Functionality Full Functionality
Protection against known and zero-day exploits Full Functionality Full Functionality Functionality Functionality   Functionality Full Functionality
Anti-spyware, anti-phishing protection, etc. Full Functionality Full Functionality Full Functionality Full Functionality   Full Functionality Full Functionality
Protection for multiple attack vectors (Web, email, network, devices) Full Functionality Functionality Full Functionality Full Functionality   Full Functionality Full Functionality
Traditional protection with generic and optimized signatures Full Functionality Full Functionality Full Functionality Full Functionality   Full Functionality Full Functionality
Protection against Advanced Persistent Threats (APT) Full Functionality Full Functionality         Full Functionality
Managed service: Classification of 100% of applications before execution (1*) Full Functionality Full Functionality         Full Functionality
Managed service: Threat Hunting (2*) Full Functionality Full Functionality         Full Functionality
Queries to Panda’s cloud-based collective intelligence Full Functionality Full Functionality Full Functionality Full Functionality   Full Functionality Full Functionality
Behavioral blocking and IoA detection Full Functionality Full Functionality Functionality Functionality   Functionality Full Functionality
Personal and managed firewall Full Functionality   Full Functionality Full Functionality   Full Functionality Full Functionality
IDS / HIDS Full Functionality   Full Functionality Full Functionality   Full Functionality Full Functionality
Ability to block unknown and unwanted applications Full Functionality Full Functionality         Full Functionality
Device control Full Functionality   Full Functionality Full Functionality   Full Functionality Full Functionality
URL filtering by category (Web browsing monitoring) Full Functionality   Full Functionality     Full Functionality Full Functionality
Content, Virus and Spam filtering for Exchange Server Full Functionality   Full Functionality     Full Functionality Full Functionality
Built-in antivirus protection for Exchange Server Full Functionality   Full Functionality     Full Functionality Full Functionality
Built-in anti-spam protection for Exchange Server Full Functionality   Full Functionality     Full Functionality Full Functionality
Monitoring
Advanced endpoint security Full Functionality Full Functionality         Full Functionality
Cloud-based continuous monitoring of all process activity Full Functionality Full Functionality         Full Functionality
Data retention for one year for retrospective attack investigation Full Functionality Full Functionality         Full Functionality
Detection
Detection of compromised trusted applications Full Functionality Full Functionality         Full Functionality
Managed service: Classification of 100% of applications during and after execution (1*) Full Functionality Full Functionality         Full Functionality
Fully configurable and instant security risk alerts Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.   Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.
Containment
Real-time computer isolation from the cloud console Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.         Full functionality. Only in Aether-based solutions.
Response and remediation
Ability to roll back and remediate the actions committed by attackers Full Functionality Full Functionality Full Functionality Full Functionality   Full Functionality Full Functionality
Centralized quarantine Full Functionality Full Functionality Full Functionality Full Functionality   Full Functionality Full Functionality
Automatic analysis and disinfection Full Functionality Full Functionality Full Functionality Full Functionality   Full Functionality Full Functionality
Investigation
Managed service: Threat Hunting (2*) Full Functionality Full Functionality         Full Functionality
Incident graphs and lifecycle information available from the Web console Full Functionality Full Functionality         Full Functionality
Ability to export lifecycle information for local analysis Full Functionality Full Functionality         Full Functionality
Advanced Visualization Tool (add-on) Full Functionality Full Functionality         Full Functionality
Discovery and monitoring of unstructured personal data across endpoints (add-on) Full Functionality Full Functionality         Full Functionality
Attack surface reduction
Information about each computer's hardware and software components Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.   Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.
Information about the Microsoft updates installed on endpoints Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.   Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.
Real-time information about the status of all protections and communications Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.   Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.
Unattended, automatic updates Full Functionality Full Functionality Full Functionality Full Functionality   Full Functionality Full Functionality
Automatic discovery of unprotected endpoints Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.   Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.
Ability to immediately protect unprotected endpoints remotely Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.   Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.
Panda native proxy to support endpoints with no Internet connection Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.   Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.
Endpoint security management
Centralized cloud-based console Full Functionality Full Functionality Full Functionality Full Functionality Full Functionality Full Functionality Full Functionality
Settings inheritance between groups and endpoints Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.   Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.
Ability to configure and apply settings on a group basis Full Functionality Full Functionality Full Functionality Full Functionality   Full Functionality Full Functionality
Ability to configure and apply settings on a per-endpoint basis Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.   Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.
Real-time deployment of settings from the console to endpoints Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.   Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.
Security management based on endpoint views and dynamic filters Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.   Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.
Ability to schedule and perform tasks on endpoint views Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.   Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.
Ability to assign preconfigured roles to console users Full Functionality Full Functionality Full Functionality Full Functionality   Full Functionality Full Functionality
Ability to assign custom permissions to console users Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.   Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.
User activity auditing Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.   Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.
Installation via MSI packages, download URLs, and emails sent to end users Full Functionality Full Functionality Full Functionality Full Functionality   Full Functionality Full Functionality
On-demand and scheduled reports at different levels and with multiple granularity options Full Functionality Full Functionality Full Functionality Full Functionality   Full Functionality Full Functionality
Security KPIs and management dashboards Full Functionality Full Functionality Full Functionality Full Functionality   Full Functionality Full Functionality
System status reports at different levels and with multiple granularity options Full Functionality Full Functionality Full Functionality Full Functionality Full Functionality Full Functionality Full Functionality
Device inventory and audits         Full Functionality Full Functionality Full Functionality
Agent and agentless monitoring of devices         Full Functionality Full Functionality Full Functionality
Patch management         Full Functionality Full Functionality Full Functionality
Centralized software installation         Full Functionality Full Functionality Full Functionality
Non-disruptive remote access         Full Functionality Full Functionality Full Functionality
Remote Desktop         Full Functionality Full Functionality Full Functionality
Built-in chat         Full Functionality Full Functionality Full Functionality
Task automation and scripting         Full Functionality Full Functionality Full Functionality
Component store - ComStore         Full Functionality Full Functionality Full Functionality
Ticketing/Help Desk         Full Functionality Full Functionality Full Functionality
Modules
Panda Data Control integration Full Functionality Full Functionality         Full Functionality
Advanced Reporting Tool integration Full Functionality Full Functionality         Full Functionality
SIEM integration Full Functionality Full Functionality         Full Functionality
Panda Patch Management Full Functionality Full Functionality Full Functionality Full Functionality   Full Functionality Full Functionality
Panda Full Encryption inregration Full Functionality Full Functionality Full Functionality Full Functionality   Full Functionality Full Functionality
High availability service Full Functionality Full Functionality Full Functionality Full Functionality Full Functionality Full Functionality Full Functionality
Host platform certifications ISO27001, SAS 70 ISO27001, SAS 70 ISO27001, FISMA, SAS70, PCI DSS
Supported operating systems
Supports Windows Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions. Full functionality. Only in Aether-based solutions.
Suppots Exchange Full Functionality   Full Functionality   Full Functionality Full Functionality Full Functionality
Supports macOS X Full Functionality   Full Functionality Full Functionality Full Functionality Full Functionality Full Functionality
Supports Linux Full Functionality   Full Functionality Full Functionality Full Functionality Full Functionality Full Functionality
Supports Android Full Functionality   Full Functionality Full Functionality Full Functionality Full Functionality Full Functionality
Supports iOS         Full Functionality Full Functionality Full Functionality
Support for virtual environments - persistent and non-persistent (VDI)** Full Functionality Full Functionality Full Functionality Full Functionality   Full Functionality Full Functionality

* Panda Fusion is a bundle of Panda Endpoint Protection Plus and Panda Systems Management. Panda Fusion 360 is the combination of Panda Systems Management and Panda Adaptive Defense 360 that are sold separately
** Compatible systems with the following types of virtual machines: VMWare Desktop, VMware Server, VMware ESX, VMware ESXi, Citrix XenDesktop, XenApp, XenServer, MS Virtual Desktop y MS Virtual Servers. Panda Adaptive Defense 360 & Panda Fusion 360 solutions are compatible with Citrix Virtual Apps, Citrix Desktops 1906 & Citrix Workspace App for Windows, Panda Securtity has been verified as Citrix Ready partner.
1* 100% Classification Service.
2* Threat Hunting and Investigation Service

Documentation:

Download the Panda Adaptive Defense Datasheet (.PDF)