The Latest Evolution in Advanced Threat Protection – Adaptive Defense V 2.4

Our researchers at PandaLabs have been hard at work, building the latest version of Adaptive Defense – bringing users the best prevention, detection and response Endpoint solution, to mitigate the threat of rapidly evolving modern day threats.

Adaptive Defense V 2.4, includes Panda’s latest dynamic anti-exploit technology – able to detect both known and unknown attacks at any stage of exploitation – such as WannaCry ransomware detected on 12 May, and immediately blocked by Adaptive Defense. The dynamic anti-exploit technologies that form version 2.4 are precisely designed to detect and prevent attacks before trusted applications can be compromised.

Here are some of the key updates in Adaptive Defense V 2.4:

  1. Dynamic anti-exploit technology.
    Detection at the exploit stage of a cyber-attack. AD and AD360 incorporate a new dynamic anti-exploit technology that prevents exploit attempts through continuous monitoring of the activity of devices, and identification of both known and unknown (zero-day) exploits.
  2. Detection of malware-less/file-less attacks, and monitoring through the management console.
    AD and AD360 identify malicious behaviours of legitimate applications. These techniques are further strengthened in this version. These attacks will be managed just as any other detection, that is, they will be shown in the console’s dashboard and reports as malware detections.
  3. Identification of computers used to propagate attacks throughout the network.
    Whenever a malware/PUP is detected or an unknown item is blocked, the solution will display the network computer that the infection originated from, its IP address and even the logged-in user. All this information will be part of its life cycle.
  4. Greater flexibility for integration with the customer’s on-premise SIEM tool: Syslog and VPN.
  5. New option for integration into customer’s operational applications, through a report with protected endpoints status details. Ability to export the life cycle detail of one or multiple detections to be analysed. Command-line information in the life-cycle if used during the attack. (PowerShell command, etc.).

With this new version, Panda Adaptive Defense continues in its commitment to providing end users with seamless protection on the cutting edge of advanced cyber-security solutions.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s