Panda Adaptive Defense 360
The Solution To Advanced Cyberdefense: Adaptive Defense 360Panda Adaptive Defense 360 (AD360) is an innovative cybersecurity solution for computers, laptops and servers, delivered from the cloud. It automates the prevention, detection, containment and response to any advanced threat, zero-day malware, ransomware, phishing, in-memory exploits, and malwareless attacks. This level of protection ensures that both present and future threats are eliminated regardless of if they reside inside or outside of the corporate network.
Unlike other solutions that focus solely on EDR capabilities, AD360 combines traditional endpoint protection (EPP) with next-gen automated EDR capabilities providing a full protection model to address both known and unknown threats. Another market differentiator are two key features that AD360 delivers as a service, unlike competitors that leave the management of both to the IT department:
- 100% Classification Service
- Threat Hunting and Investigation Service
Thanks to its cloud architecture, the agent is lightweight and has little impact on endpoints, which are managed via a single cloud architecture, even when they are isolated.
Panda Adaptive Defense 360 is accessible from a single web console. It integrates Cloud Protection and Management Platforms (Aether), which maximize prevention, detection and automated response, minimizing the effort required.
Key Features
Threat Hunting Service
The Threat Hunting and Investigation Service is operated by our analysts to detect hacking and Living-off-the-Land techniques. Through their conclusions, they also enrich our machine learning algorithms. Our team of cybersecurity experts analyzes any suspicious case and investigates the indicators of attack to find evasion and compromise techniques (TTPs) in the event stream. Our hunters also proactively search for patterns of anomalous behavior not previously identified on the network.
- Reduce the MTTD and MTTR (Mean Time To Detect and Mean Time To Respond)
- Create new rules representing new IoAs that can be delivered to the endpoints to rapidly protect them against new attacks
- Get recommendations on how to mitigate the attack and reduce the attack surface to avoid falling victim to future attacks