Panda Adaptive Defense 360

Panda Adaptive Defense 360

Panda Adaptive Defense 360 is the first and only offering to combine Endpoint Protection (EPP) and Endpoint Detection & Response (EDR) capabilities into a single solution. Panda Adaptive Defense 360 also automates capabilities reducing the burden on IT. Close the cycle of malware protection integrating full detection, response and remediation capabilities.

  • Panda Adaptive Defense 360 548 KB

    An overview of Panda Adaptive Defense 360 along with modules Advanced Reporting Tool, Data Control and Patch Management. Panda Product Portfolio feature matrix.

    21 Sep 2018

Product Categories

  1. Product Categories
    Anti-Malware
    • Anti-Virus
    Managed Services
    • Cloud Security
    Network Security
    • Intrusion Prevention/Detection
    Risk Management
    • Threat Intelligence
    • Vulnerability Management

Panda Security

Stand:
  • E180
  • Product Information
  • Images
  • Social Media
  • New Exhibitor
Panda Security are the leading European vendor of EDR systems, with 30 years of technological innovation leading to the most important advances in the world of cybersecurity. Panda Adaptive Defense 36...Panda Security are the leading European vendor of EDR systems, with 30 years of technological innovation leading to the most important advances in the world of cybersecurity. Panda Adaptive Defense 360 model is a reinvention of cybersecurity, enabling Panda Security clients to stay ahead of cybercriminals - Reinventing CybersecurityMore

View Company Profile

More products from this Company:

  • Panda Advanced Reporting Tool

    Panda Advanced Reporting Tool - From Data to Actionable IT and Security Insight IT departments are overwhelmed: The increase in the security data vol...

  • Panda Data Control

    Uncontrolled access to your company's personal and sensitive data is an everyday security threat that may lead to serious financial loss and reputatio...

  • Panda Patch Management

    Panda Patch Management is a user-friendly solution for managing vulnerabilities of the operating systems and third-party applications on Windows works...

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.