RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2

Panda Adaptive Defense

Product
Developers: Panda Security
Date of the premiere of the system: 2015/09/24
Last Release Date: 2018/06/04
Technology: Cybersecurity - Antiviruses,  cybersecurity - the Antispam,  the Firewall,  cybersecurity - the Fraud detection system (fraud),  cybersecurity - Information management and events in a security system (SIEM)

Content

Adaptive Defense is corporate solution with protection against the improved and directed attacks.

2019: Status Citrix Ready

Corporate solution of information security with options of expanded protection of Panda Adaptive Defense 360 in the fall of 2019 was included in the list of the services offered by the Citrix Ready Marketplace platform for increase in security in virtual environments (SVE).

The purpose [1] is in checking correctness of work of solutions of Citrix for mobile platforms, virtualizations, networks and clouds with the verified products.

The status Citrix Ready is given to those software makers who successfully passed the test criteria set by Citrix company. Such verification gives to clients additional confidence in compatibility and technical integration of the joint solution.

2018: Module of data security Panda DataControl

On June 4, 2018 the Panda Security company provided the module of data security Panda Data Control adapted for requirements of the European legislation for personal data protection (General Data Protection Regulation) which became effective since May 25, 2018.

The Panda Security company provided the module of data security Panda DataControl

Integrated into the Panda Adaptive Defense platform, the module Panda Data Control detects, checks and performs monitoring of unstructured personal data on end devices: used at present, not used or transferred.

Panda Security considers that the organizations protected by the solution Panda Adaptive Defense can be sure that their end devices and servers will not be compromised with the malware arriving from external sources, and therefore they will not become the victims of the external attacks on theft of data. The module Panda Data Control is intended for security of the unstructured personal data found and used on end devices.

According to the developer the module Panda Data Control has the following advantages on data security provision:

  • Search and audit: Finding of files with personal data (PII) and also users, employees, contractors, end devices and servers in the organization which get access to this personally identified information.
  • Monitoring and detection: The reports and notifications in real time offered by the module Panda Data Control on unauthorized and suspicious use, transfer and extraction of files with personal data, help to implement pro-active measures concerning access and transactions with these files.
  • Simplification of management processes: The module Panda Data Control is the module which is built in the solutions Panda Adaptive Defense and Panda Adaptive Defense 360. Its use does not require from the organizations to implement something in addition to the protection, and it can be quickly activated without difficult processes of setup. After activation the module turns on then it can be managed through the cloud management console.
  • Demonstration to company management, the responsible on security of personal data (DPO) and all other employees in the organization severe measures on ensuring protection of PII files which can not be used, used or be transferred between end devices and servers at present.

Sales of the module Panda Data Control in Russia and the CIS countries will begin presumably not earlier than 4 quarters 2018 as the add-on module to the solutions Panda Adaptive Defense and Panda Adaptive Defense 360.

2017: Panda Adaptive Defense 2.4

This version of Adaptive Defense with options of expanded protection of end devices against unknown threats will give to users even more impressive opportunities of prevention, detection and reaction of the modern promptly developing cyber attacks.

Version 2.4 includes new dynamic anti-eksploytnuyu technology which allows to detect much quicker and more effectively attacks on stages of operation (infection) of the known and unknown exploits and also advanced opportunities for the expert analysis. Dynamic anti-eksploytnye the technologies included in new version 2.4 are specially developed for detection and interruption of the attacks before they are able to compromise reliable applications.

The most noticeable improvements which are added to the new version are included below:

  • Dynamic anti-eksploytnaya technology. Detection of cyber attack to stages of operation (infection). The solutions Adaptive Defense and Adaptive Defense 360 contain new dynamic anti-eksploytnuyu technology which prevents attempts of use of vulnerabilities due to continuous monitoring of activity of devices and also known to identification and unknown (zero day) exploits.
  • Detection of the attacks which do not use malware, and the bezfaylovy attacks and also monitoring using the management console. The solutions Adaptive Defense and Adaptive Defense 360 identify harmful behavior of legitimate applications. These technicians are considerably strengthened in the new version. The similar attacks are controlled in the same way, as well as any other detection, i.e. now they are shown in a monitoring panel in the management console a product and are registered as harmful detection.
  • Identification of the computers used for distribution of the attacks to networks. Every time at detection of malware/PNP (potentially undesirable program) or when blocking an unknown object, the solution shows the networked PC from where spread of an infection, its IP address and even the user connected at that time began. All this information became a part of data on lifecycle of threat.
  • The increased flexibility for integration into the local client SIEM solution: Syslog and VPN.
  • New opportunity for integration into client operational applications, thanks to new reports with detailed information on the status of end devices. A possibility of export of detailed information on lifecycle of one or several threats (or the blocked objects) for their complete analysis and also information on parameters in the command line if they were used in attack time (the PowerShell commands and so forth).

2015

Panda Adaptive Defense 360

Panda Adaptive Defense 360 is a broader service of security with opportunities of blocking and treatment.

On September 21, 2015 the Panda Security company announced product output of Panda Adaptive Defense 360 combining effective antivirus protection with the newest technologies of expanded protection.

As a part of the management console of Panda Adaptive Defense 360 two solutions Panda Security:

  • Panda Endpoint Protection Plus is the solution of the class EPP (Endpoint Protection Platform) containing all functions of traditional protection:
  • antivirus,
  • protection against malware,
  • personal firewall,
  • web filter
  • e-mail filtering,
  • control of devices.

Columns of control of system (2015)

The solution provides service of detection of the attacks on endpoints, capable to precisely classify each application in the company to give the chance to start only licensed applications.

Panda Adaptive Defense 360 detects threats in an environment regardless of a source, including USB.

Functions in Panda Adaptive Defense 360 are based on three principles:

  • continuous application monitoring and servers of the company.
  • automatic classification with use the technician of machine learning on the platform of Big Data Panda.
  • the analysis and manual classification from technical specialists of anti-virus laboratory PandaLabs of those applications which were not classified automatically, for studying of behavior of the happening processes.


Protection of the outdated systems

The outdate, not updated systems become the gateway for penetration of malware into the company. Panda Adaptive Defense 360 contains functions of protection against vulnerabilities which use contextual and behavioural rules therefore the enterprises can work in the safe environment, even if they did not update the systems.


Information in real time

Panda Adaptive Defense 360 implements means of visual control of start of malware in the company. The solution detects their location in corporate network and announces the performed operations, such as creation of files and direction of communications.

The same way the product continuously provides information on the status of network: sends operational notifications in case of penetration into network of the malware, provides information on actions taken at permission of a specific incident.

Panda Adaptive Defense 1.5

On April 14, 2015 the Panda Security company announced a release of the version of the managed Adaptive Defense 1.5 service.

The main novelty in the Adaptive Defense 1.5 functions:

  • service of treatment,
  • possibility of viewing status of endpoints in real time
  • ability to manage settings via the uniform web console.

Screenshot of the program window, 2014

Adaptive Defense offers security model based on monitoring, control, classification of behavior and the nature of each started application that allows to provide reliable and security blanket, allowing only start of legal applications.

Capability of solution integration in the existing user's infrastructure, coexistence with traditional anti-virus solutions and the SIEM solution used by the company in combination with treatment functions, does Adaptive Defense by full-fledged corporate solution for protection against all types of malware, including the directed attacks and threats of "zero day".

The blocking modes in Adaptive Defense 1.5 provide full and reliable protection for all companies, representatives of the company said.

Adaptive Defense 1.5 constantly scans applications which try to be started, automatically classifies all applications, using methods of machine learning in environments with Big Data under control of technical specialists of PandaLabs. If the malware is identified, the user receives the message with the complete report containing information on location of threat, the infected machines and the operations performed by the malware. Special diagrams allow the administrator to browse the events caused by the malware, providing the accurate and comprehensive information about the operations performed by it, receivers of messages and the created files.

Adaptive Defense identifies the software with the known vulnerabilities set in network.

Notes

  1. of the Citrix Readyprogramma Citrix Ready Program program is an affiliate technology program which helps producers of services, program and the hardware of all types to develop and integrate the products with Citrix technologies for a digital working space, networks and cloud services. All products provided to Citrix Ready passed verification test that provides confidence in compatibility of the joint solution. Using the alliances conducting in the industry and a partner ecosystem, Citrix Ready presents the chosen reliable solutions developed for satisfaction of different business needs.