|
These exploits leverage both known and unknown (zero-day) vulnerabilities, triggering a chain ofevents (CKC, Cyber Kill Chain) that they must follow to compromise systems. Panda Adaptive Defense360 blocks this chain of events effectively and in real time, neutralizing exploit attacks and renderingthem harmless
In order to detect the vulnerability exploit techniques used by hackers, Panda Adaptive Defense 360implements new hooks in the operating system, using them to locally and continually monitor allactions taken by the processes run on users’ computers. This strategy goes beyond the traditionalapproach used by other security products and consisting of searching for patterns and staticallydetecting CVE-payload pairs through signature files.
In short, Panda Adaptive Defense 360 leverages constantly-evolving technologies to provide globalanti-exploit protection against advanced vulnerability exploit techniques such as the following:
- Attack Surface Reduction (ASR)
- Data Execution Prevention (DEP)• Structured Exception Handling Overwrite Protection (SEHOP)
- Null Page Security Mitigation• Heap Spray Allocation
- Export Address Table Access Filtering (EAF)
- Mandatory Address Space Layout Randomization (ASLR)
- Bottom-Up ASLR Security Mitigation
- Load Library Check – Return Oriented Programming (ROP)