Panda Security: Adaptive Defense 360

Panda Security: Adaptive Defense 360

The first advanced security service with blocking and disinfection capabilities

Adaptive Defense 360 is the first and only product that combines the most effective antivirus protection with the latest advanced protection technology. Adaptive Defense 360 classifies all running processes, assuring the proactive detection of unusual behavior and advanced threats, from Cryptolocker to zero-day attacks, and offers forensic and remediation features.

With more than 230,000 new malware samples received daily by Panda Security, and ever more sophisticated infection techniques, businesses are facing increased threats that put their confidential information at risk of leaving them compromised. For this reason, Panda Security presents Adaptive Defense 360, which blocks attacks that a traditional antivirus can’t.

Adaptive Defense 360 combines two of Panda Security’s leading solutions:

  • Panda Endpoint Protection Plus is our Endpoint Protection Platform (EPP) solution and comes with all of the features of a traditional antimalware solution: antivirus, antimalware, personal firewall, web and mail filtering, and device management.
  • Panda Adaptive Defense, our Endpoint Protection & Response (EDR) solution, adds detection and automated response, continuous monitoring, and real-time forensic analysis, which results in hardening and securing of the endpoint and applications.

So, the new solution combines all the advantages of a traditional antivirus – prevention and blocking of attacks, and remediation of infections – with advanced protection and full traceability, meaning we get to analyse 100% of the running applications.

The new solution provides an endpoint detection service that is able to accurately classify each of the organisation’s applications so that it only runs what is defined goodware. This is precisely what differentiates Adaptive Defense 360 from conventional anti-viruses.

Another advantage of being on the endpoint is that Adaptive Defense 360 detects threats in a real environment regardless of source, including attached devices. This is something which does not happen with most ATD (Advanced Threat Detection) solutions, as they only locate threats that enter the at the network perimeter and within virtualised environments.

The process in the Endpoint of Panda Adaptive Defense 360 are based on three principles:

1. Continuous monitoring of applications and servers of the company.
2. Automatic classification using Machine Learning techniques in Panda’s Big Data platform.
3. Analysis and manual classification, by PandaLabs’ technicians, of applications that are automatically unclassified to understand the behavior of what is running.

With this kind of protection and response in the Endpoint, you achieve a complete solution to fight against malware.

“Adaptive Defense 360 is well above other solutions on the market that tackle traditional threats, vulnerable applications or advanced threats. The key is continuously analysing all computer activity to classify each process as goodware and malware and, to complete the detection cycle, Adaptive Defense 360 includes integrated remediation”, explains Juan Santesmases, VP Product Management & Business Development at Panda Security.

Protection for outdated systems
The lack of updates on systems is an open window for malware to enter companies. Adaptive Defense 360 includes a section against vulnerabilities that uses contextual and behavioral rules so that companies can work in a safe environment even if they don’t have the systems up to date.

Real-time information
Adaptive Defense 360 allows visual monitoring of what is triggering malware within the company. It not only locates where it is housed in the company network, but also reports the actions being carried out such as the creation of files and the destination of communications.

In a similar way, it provides continuous information of the network’s status. It sends immediate alerts when a malware enters the network and of the actions being undertaken to address it.

100% Managed
Adaptive Defense 360 allows companies to avoid having to invest resources in technical staff to manage quarantines, suspicious files, and reinstallation or disinfection of infected computers.

360 Adaptive Defense automatically classifies all applications using Machine Learning techniques in Big Data environments, all under constant supervision of PandaLabs’ specialised technicians who manage the entire process.

[su_button url=”http://www.pandasecurity.com/uk/enterprise/solutions/adaptive-defense-360/” target=”blank” style=”flat” background=”#df2027″ color=”#ffffff” size=”10″ radius=”0″ icon=”icon: arrow-circle-right”]For more on Panda Security click here[/su_button]

About Security Buyer

Security Buyer is the leading authority in global security content, delivering expert news, in-depth articles, exclusive interviews, and industry insights across print, digital, and event platforms. Published 10 times a year, the magazine is a trusted resource for professionals seeking updates and analysis on the latest developments in the security sector.

To submit an article, or for sponsorship opportunities, please contact our team below.

Rebecca Spayne picture 2025

Rebecca Spayne

Managing
EDITOR

Georgina Turner image

Georgina Turner

Sales
Manager

Afua Akoto image - Security Buyer

Afua Akoto

Marketing Manager

Read the Latest Issue

Follow us on X

Follow us on X

Click Here

Follow us on LinkedIn

Follow us on LinkedIn

Click Here

Advertise here

Reach decision makers and amplify your marketing

Advertise here

Click Here

Related News

Image provided by SentinelOne

SentinelOne to Spotlight AI-Power at GISEC 2025

SentinelOne announces its participation at GISEC Global 2025 (6-8 May) at the Dubai World Trade Centre. The company will highlight..
Two young intercultural programmers trying to solve problem with access to data while interacting in front of computers

DDoS attacks targeting critical infrastructure

NETSCOUT released its 2H2024 DDoS Threat Intelligence Report, revealing how Distributed Denial of Service (DDoS)…
Copyright: Security Buyer

ASIS UK Launches “Security is You(th)” Hackathon

ASIS International UK has launched Security is You(th), an initiative designed to engage students and early-career professionals…
BeyondTrust

Into the Cloud – Morey J. Haber, BeyondTrust

The January edition of International Security Buyer featured Morey J Haber, Chief Security Advisor for BeyondTrust in our Into the Cloud…
Riham Security website

Growing Intersec Saudi Arabia

Intersec Saudi Arabia’s Event Director, Riham Sedik, discusses the event’s future growth and government partnerships

Neustar Security Services introduces UltraPlatform

Neustar Security Services, a provider of cloud-based security services that enable businesses to thrive online, is launching UltraPlatform.

Security and fire 2023 trends

In 2023 all industries will face several challenges: sustainability, cost increases, and how to better manage energy & resources.
istorage

Zero trust, maximum caution

John Michael, CEO, iStorage considers the dangerous new ‘golden age’ of ransomware, ways businesses can neutralise..

LAPSUS$ exposes cyber gaps in organisations

The LAPSUS$ group exploded onto the cyber scene late last year after successfully breaching major companies.

BeyondTrust Remote Support receives new patch

BeyondTrust, an intelligent identity and access security company, has announced the release of BeyondTrust Remote Support 22.2.
Scroll to Top