Vous êtes sur la page 1sur 2

Panda Adaptive “Panda Security was named a Visionary in the Reinventing

Defense 360 Cybersecurity


Gartner 2018 Magic Quadrant for Endpoint
Protection Platforms1.”
Ian McShane, Eric Ouellet,
Avivah Litan, Prateek Bhajanka.
Endpoint Protection Platform, EDR, 100% Gartner 2018 Magic Quadrant
The new security model that has
Attestation and Threat Hunting. for Endpoint Protection Platforms
January 2018 all the answers.
Panda Adaptive Defense 360 is a cybersecurity suite that Panda Security unveils a new security model that combines
combines Endpoint Protection and Endpoint Detection the latest technology in prevention, detection, response
and Response (EDR) solutions, with 100% attestation and remediation.
andThreat Hunting & Investigation, all equipped
in a unique, lightweight agent.
“A necessary evolution against unknown
threats. Panda Adaptive Defense has a Continuous monitoring
The value of this advanced cybersecurity service is based compendium of tools that we have not seen in of all applications
on four principles:
other solutions.”
Data and Analytics. Industry: Services Classification of all processes
250M -500 M USD.North America
December 2018
on all endpoints
www.gartner.com/reviews/review/view/646718
Prevention, Detection
Big Data and Machine
and response Learning Technologies
for attacks with and without malware,
in a single agent
Behavior analysis carried
out by technicians
Real time and Historical
visibility Prevention against
detailed information of all activity
4.6 92% Known Malware
on endpoints 131 Verified reviews Recommend

Detection of
Advanced Malware
Classification of 100%
of processes
Dynamic Exploit
99.98% via Machine Learning, 0.02% Detection
by expert Panda analysts Limitless Visibility, Absolute Control

Behavior-Based
Threat Hunting and Detection
Forensic Analysis of Attacks
carried out by Panda Security analysts
and our MSSPs

Find out everything Panda Adaptive Defense


360 and its modules can do for you:

The combination of these solutions and services provides


a detailed overview of all activities on every endpoint, total
control of running processes, and reduction of the attack LIVE DEMO
surface.
Panda Patch Advanced SIEM
Management Reporting Tool Feeder
Panda Patch Management is a user-friendly solution for This module aggregates all the data gathered, correlating and This module generates added value and offers greater
managing vulnerabilities of the operating systems and graphically presenting it in real time to offer granular visibility visibility into everything happening on your network by
third-party applications on Windows workstations and servers. into any event that takes place on the network. Advanced incorporating all the data gathered by Adaptive Defense
It reduces risk while strengthening the prevention, containment Reporting Tool automatically generates security intelligence into your own SIEM solution.
and attack surface reduction capabilities of your organization. and allows organizations to pinpoint attacks and unusual
The solution does not require the deployment of any new behaviors, as well as internal misuse, based on the monitored With this module, you can integrate a new source of critical
endpoint agents or management console as it is fully events gathered at the endpoints. information: the processes and programs run on every
integrated in all of Panda Security's endpoint solutions. device in your company.

Plus, it provides centralized, real-time visibility into the Perform calculations and graphical visualization
SIEM FEEDER MODULE WILL REVEAL
security status of software vulnerabilities, missing patches,
updates and unsupported (EOL3) software, inside and outside Receive alerts on Network Security Status Indicators and
the corporate network, as well as easy-to-use and real-time IT resources usage
Which new programs are being run
tools for the entire patch management cycle: from discovery Determine threat origin and perform forensic analysis
and planning to installation and monitoring. and are not yet classified
Gain visibility into endpoint vulnerability
Discovery: vulnerable computers, patches and pending Monitor and control misuse of corporate resources
updates How these programs
reached your network
Patch and update planning and installation tasks

Endpoint and update status Monitoring

Granular management based on groups and roles with Any suspicious activity
different permissions on users’ devices

ATTACK PROTECTION
ADAPTIVE SECURITY ARCHITECTURE Which software with vulnerabilities
is being used
PREDICT/ANTICIPATE PREVENT
Discovery vulnerabilities, Automate scheduled
pending patches and patching.
updates, EoL Replacement Which processes are accessing user data
applications of EoL and transmitting it outside the company
applications
CONTINUOUS
VISIBILITY AND
ASSESSMENT How much network resources
each process is consuming
Containment of
Patching all attacks by patching
vulnerable endpoints in real time

RESPOND DETECT & CONTAIN

MORE INFORMATION MORE INFORMATION MORE INFORMATION

Vous aimerez peut-être aussi