Viimeisin kampanjatiedotteemme on ilmestynyt 16.5.22, kts tarkemmat tiedot KAMPANJA-linkistä!

Softa SuperStore

20.05.2022 • • 04:32

Asiakaspalvelu
ark. 10.30 - 16
09 - 3424 370
 

          TUOTEHAKU

 TUOTERYHMÄT

 Muokkaa evästevalintoja
Näytä ostoskori
PÄÄVALIKKO
 
Luotettava Kumppani –yritys
 
Softa SuperStore - yksi Suomen vahvimmista!

 

Panda Adaptive Defense 360

Founded in 1990, Panda Security is the world’s leading provider of cloud-based security solutions, with products available in more than 23 languages and millions of users located in 195 countries around the World. Panda Security was the first IT security company to harness the power of cloud computing with its Collective Intelligence technology. This innovative security model can automatically analyze and classify thousands of new malware samples every day, guaranteeing corporate customers and home users the most effective protection against Internet threats with minimum impact on system performance. Panda Security has 80 offices throughout the globe with US headquarters in Florida and European headquarters in Spain.

Panda Securityn Pohjoismaiden toiminnot hoitaa Panda Security Sweden AB, ja Suomen toimistomme sijaitsee Tampereella osoitteessa Haarlankatu 1 F. Panda Security on perustettu vuonna 1990, ja alusta asti olemme valmistaneet antivirustuotteita sekä yrityksille että kuluttajille. Tuotevalikoimamme on sittemmin laajentunut muun muassa palomuuri- ja sovellusanalyysiratkaisuihin sekä softatyökaluihin. Suomen myyntiorganisaatio keskittyy ensisijaisesti yritystuotteisiin, ja esittelemme tuotteita webinaareilla. Tuotteista on saatavissa kokeiluversiot, ja opastamme tuotteiden käyttöön suomeksi ja englanniksi.

Adaptive Defense 360
Find the answer, solve the problem

Endpoint Detection and Response (EDR) and Endpoint Protection (EPP) services for enterprises brought together for the first time by Panda: pioneers in cyber-security.

COMPLETE ENDPOINT DEFENSE INTEGRATING PROTECTION, DETECTION, RESPONSE AND REMEDIATION FOR ALL TYPES OF THREATS IN A SINGLE SOLUTION.

Adaptive Defense 360 is the first and only cyber-security solution to combine the most effective traditional antivirus and the latest advanced protection technology with the ability to classify all running processes.

Adaptive Defense 360 is a detection and response service that can accurately classify every process on all your company’s endpoints, allowing only legitimate programs to run. Adaptive Defense 360 relies on a a new security model based on three principles:

  • Continuous monitoring of all processes on a company’s computers and servers.
  • Automatic classification using Machine Learning on our Big Data platform in the cloud.
  • Technical experts who analyze all processes that are not classified automatically, to evaluate the behavior of everything that runs on your systems

ARE YOU KEEPING YOUR BUSINESS DATA SECURE?

Confidential data, accounting systems, passwords, customer databases… Bear in mind that eventually someone will try to steal these things. The real question is, will you be able to stop it? Panda Adaptive Defense 360 provides you with a genuine answer to your needs.

With Adaptive Defense 360, we monitor and classify all YOUR software to make sure we discover and stop all malware in YOUR systems.

Adaptive Defense 360 provides automated remediation, real-time monitoring and reports, profile-based protection, centralized control of devices, as well as Web monitoring and filtering.

COMPLETE, ROBUST PROTECTION GUARANTEED

Panda Adaptive Defense 360 offers two operational modes:

  • Standard Mode allows applications classified as goodware to run, as well as those that are yet to be cataloged by the automated systems and Panda Security.
  • Extended Mode only allows the execution of goodware.
  • Extended blocking is the ideal form of protection for companies with a ‘zero risk’ approach to security.

FORENSIC INFORMATION

  • Execution event graphs give a clear view of all events caused by malware.
  • Get visual information through heat maps on the destination of malware communications, files created and much more
  • Identify and locate the software vulnerabilities on your network.

FULL ANTIVIRUS CAPABILITIES

Adaptive Defense 360 includes Endpoint Protection capabilities, offering:

  • Remediation actions.
  • Centralized device control: Prevent malware entry and data loss by blocking certain types of devices.
  • Web monitoring and filtering.
  • Antivirus and anti-spam for Exchange Server.
  • Endpoint firewall, and much more.

100% AUTOMATED SERVICE

Forget about having to invest in technical personnel to deal with quarantines or suspicious files or disinfect and restore infected computers. Adaptive Defense 360 automatically classifies all applications using Machine Learning techniques in our Big Data environments, constantly supervised by our PandaLabs technicians.

CONTINUOUS NETWORK STATUS INFORMATION

Get alerts as soon as any malware is identified on the network, with detailed information on its location, the devices affected and the type of malware. You will also get email reports about the day-to-day activity of the service.

SIEM AVAILABLE

Adaptive Defense 360 integrates with SIEM solutions to provide detailed data on the activity of all applications run on your systems. For those without SIEM, Adaptive Defense 360 optionally includes its own security event management and storage system for real-time analysis of all the collected data.

KEY BENEFITS OF ADAPTIVE DEFENSE 360

BLOCKING AND DISINFECTION:

This is the first and only advanced protection to combine disinfection and remediation capabilities.

Adaptive Defense 360 blocks and disinfects all malware detected.

CLASSIFICATION OF 100% OF RUNNING PROCESSES:

All active processes are classified, thereby guaranteeing protection against known malware and advanced attacks.

WE SEE WHAT OTHERS DON’T SEE:

Thanks to the classification of 100% of running processes, we are able to detect malware and anomalous behavior which other solutions can’t detect.

VISUAL AND DYNAMIC DATA FLOW:

See what is happening with each process and file. You will have a graphic, detailed analysis of the data flow represented on a dynamic map so you can see how and where malware has tried to enter, the action it tried to take, or who is trying to steal data and how.

DATA LEAKAGE DETECTION (DLD):

Prevent data leakage, whether perpetrated by malware or by employees copying data to physical drives or uploading it to the cloud.

CONTROL OVER VULNERABLE AND UNWANTED SOFTWARE:

Identify and resolve system and program vulnerabilities and prevent use of unwanted software (browser toolbars, adware, add-ons, etc.).

ADVANCED REPORTING TOOL:

Track security events through monitoring, data aggregation and correlation, notifications and real-time reports.

A HIGHLY AUTOMATED SOLUTION:

The combination of a managed service with a highly intuitive console and a light and simple agent reduces the workload of local IT staff to a minimum, and the impact on endpoints is negligible.

TECHNICAL REQUIREMENTS

WEB CONSOLE (monitoring only)

  • Internet connection
  • Internet Explorer 7.0 or later
  • Firefox 3.0 or later
  • Google Chrome 2.0 or later

AGENT

  • Operating systems (workstations):
    • Windows XP SP2 or later (Vista, Windows 7, 8, 8.1, 10).
  • Operating systems (servers):
    • Windows Server 2003, 2008 and 2012.
  • Internet connection (direct or via proxy)
  • Partial support: -Linux, Mac OS X and Android 

PARTIAL SUPPORT

  • Linux, Mac OS X and Android

Panda Suomi YouTube Channel
 

Softa SuperStore
Softa SuperStore
Softa SuperStore