Panda Adaptive Defense 360

The Solution To Advanced Cyberdefense: Adaptive Defense 360

Panda Adaptive Defense 360 (AD360) is an innovative cybersecurity solution for computers, laptops and servers, delivered from the cloud. It automates the prevention, detection, containment and response to any advanced threat, zero-day malware, ransomware, phishing, in-memory exploits, and malwareless attacks. This level of protection ensures that both present and future threats are eliminated regardless of if they reside inside or outside of the corporate network.

Unlike other solutions that focus solely on EDR capabilities, AD360 combines traditional endpoint protection (EPP) with next-gen automated EDR capabilities providing a full protection model to address both known and unknown threats. Another market differentiator are two key features that AD360 delivers as a service, unlike competitors that leave the management of both to the IT department:

  • 100% Classification Service
  • Threat Hunting and Investigation Service

Thanks to its cloud architecture, the agent is lightweight and has little impact on endpoints, which are managed via a single cloud architecture, even when they are isolated.

Panda Adaptive Defense 360 is accessible from a single web console. It integrates Cloud Protection and Management Platforms (Aether), which maximize prevention, detection and automated response, minimizing the effort required.


Key Features

• Automates and reduces detection, response and investigation time

• Forensic information to investigate each attack attempt, and tools to mitigate its effects

• Detects and blocks hacking techniques, tactics and procedures

• Traceability of each action with actionable visibility of the attacker's activity

• Remote containment from the console to endpoints, such as isolating or rebooting computers

• Detection of abnormal endpoint behavior (IOAs) by blocking the attacker

Threat Hunting Service


The Threat Hunting and Investigation Service is operated by our analysts to detect hacking and Living-off-the-Land techniques. Through their conclusions, they also enrich our machine learning algorithms. Our team of cybersecurity experts analyzes any suspicious case and investigates the indicators of attack to find evasion and compromise techniques (TTPs) in the event stream. Our hunters also proactively search for patterns of anomalous behavior not previously identified on the network.

  • Reduce the MTTD and MTTR (Mean Time To Detect and Mean Time To Respond)
  • Create new rules representing new IoAs that can be delivered to the endpoints to rapidly protect them against new attacks
  • Get recommendations on how to mitigate the attack and reduce the attack surface to avoid falling victim to future attacks

Benefits of Adaptive Defense 360

Simplifies and Minimises
Security Costs

• Managed services means there are no tasks to delegate and no false alerts to manage which reduces the costs of expert personnel needed

• The managed services automatically learn from threats so no time is wasted on manual settings

• Maximum prevention on the endpoint reduces operating costs to almost zero

• No management infrastructure to install, configure or maintain

• Endpoint performance is not impacted since it is based on a lightweight agent and cloud-native architecture

Automates and Reduces
Detection Time

• Applications that pose a security risk are blocked (by hash or process name)

• Blocks the execution of threats, zero-day malware, fileless/malwareless attacks, ransomware and phishing

• Detects and blocks malicious in-memory activity (Exploits) before it can cause damage

• Detects malicious processes that have bypassed preventive measures

• Detects and blocks hacking techniques, tactics and procedures

Automates and Reduces Response and Investigation Time

• Resolution and response via forensic information to investigate each attack attempt and tools to mitigate its effects (disinfection)

• Ability to trace each action of the attacker and their activity, facilitating forensic investigation

• Improvement and adjustments to security policies thanks to the conclusions of the forensic analysis



Get in touch

ARRANGE A FREE CONSULTATION TODAY

Our experienced team are here to help understand the way in which you do business and the way your organisation uses technology to deliver results.