Anti-exploit technology

 

Panda Security's new anti-exploit technology has significantly strengthened its security solutions, allowing organizations to detect threats no other company can detect.

 

How does Panda Security's anti-exploit technology work?

Our anti-exploit technology detects and neutralizes all types of exploits, especially zero-day exploits that take advantage of:

Refer to section Examples of vulnerability exploit techniques for more information about how exploits take advantage of software flaws in Internet browsers, applications and operating systems.

This anti-exploit technology relies on the continuous monitoring of all processes running on devices and cloud-based correlation of data through machine learning algorithms.

The key to detecting as-yet-unknown exploits is to use heuristic technologies with powerful detection capabilities. In this sense, Panda's new anti-exploit protection analyzes how exploits behave instead of their morphology.

Adaptive Defense 360 uses multiple sensors to send our Collective Intelligence servers information about the behavior of suspicious files trying to exploit 0-day vulnerabilities to infect PCs. This information allows Panda Security to keep the proactive technologies included in its products constantly up-to-date (via on-the-fly updates from the cloud).

Summing up, Adaptive Defense 360 is designed to detect and neutralize this type of malware before it has been identified (and even created), protecting users against new malware variants.

 


 

Related topics

Configuring the advanced protection

Actions on exploits

Examples of vulnerability exploit techniques