Panda Security announced the launch of Adaptive Defense 360, which combines two endpoint protection products in one console.
The first product, Endpoint Protection Plus includes anti-virus, anti-malware, personal firewall, Web and mail filtering, and device management capabilities.
The second, Adaptive Defense, adds detection and automated response, continuous monitoring, and real-time forensic analysis, which further strengthens and secures the endpoint.
“It is clear nowadays that modern antivirus solutions have their limitations,” Luis Corrons, PandaLabs technical director, told eWEEK. What companies need, he said, is “a different approach that enables control of everything that is executed in their endpoints and servers. That’s how Adaptive Defense was born.”
Corrons said most of the company’s AD customers are running antivirus solutions from different vendors. Adaptive Defense is able to detect and block attacks that were missed by other antivirus providers, but when companies had to clean or disinfect, they had to wait until their [other] providers were able to do it.
“For us, it was easy to add to the mix our own anti-malware solution and work in combination with Adaptive Defense to have automatic remediation,” Corrons said.
The platform combines traditional antivirus solutions, such as prevention and blocking of attacks and remediation of infections, with advanced protection and full traceability, meaning the platform analyzes all of the running applications.
“Right now businesses do not know what is happening in their network. They know that there is no malware known by their security provider running in their environment. Just that,” Corrons said. “With Adaptive Defense 360 companies will know what is really happening in real time, with forensic capabilities that give a full picture of any detected threat.”
Adaptive Defense 360 allows visual monitoring of what is triggering malware. It not only locates where it is housed in a company network, but also reports the actions being carried out, such as the creation of files and the destination of communications.
It also provides continuous information about the network’s status. It sends immediate alerts when malware enters the network and notices of the actions being undertaken to address it.
“The number of devices with network connectivity is growing exponentially, which leads to new attack vectors that have to be secured,” Corrons said. “Most threats will still be aiming to computers running Windows, OSX, or Linux, but they will be using Internet of Things devices to bypass any perimeter defense in place.”