Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • ESET PROTECT Advanced Reviews & Ratings
    2,231 Ratings
    Company Website
  • ManageEngine Endpoint Central Reviews & Ratings
    2,504 Ratings
    Company Website
  • Bitdefender Ultimate Small Business Security Reviews & Ratings
    3 Ratings
    Company Website
  • Guardz Reviews & Ratings
    106 Ratings
    Company Website
  • Iru Reviews & Ratings
    1,487 Ratings
    Company Website
  • DriveLock Reviews & Ratings
    1 Rating
    Company Website
  • ThreatLocker Reviews & Ratings
    501 Ratings
    Company Website
  • SOCRadar Extended Threat Intelligence Reviews & Ratings
    98 Ratings
    Company Website
  • Blumira Reviews & Ratings
    146 Ratings
    Company Website
  • Adaptive Security Reviews & Ratings
    83 Ratings
    Company Website

What is Panda Adaptive Defense 360?

Our comprehensive solution combines Unified Endpoint Protection (EPP) and Endpoint Detection and Response (EDR) functionalities with our cutting-edge Zero-Trust Application Service and Threat Hunting Service, allowing for thorough detection and classification of all processes on every endpoint in your organization. This state-of-the-art cloud technology delivers strong prevention, detection, and response capabilities against complex threats such as zero-day malware, ransomware, phishing schemes, in-memory exploits, and fileless malware. Furthermore, it includes essential features like intrusion detection systems (IDS), firewalls, device management, email security, as well as URL and content filtering. By automating the critical processes of prevention, detection, containment, and response, this solution significantly reduces advanced threats from both inside and outside the corporate environment, ensuring your organization remains resilient against evolving cyber threats. In addition to bolstering security, this all-encompassing solution simplifies and accelerates incident response efforts, ultimately providing peace of mind for your organization's digital landscape. As cyber threats continue to advance, having such a robust defense mechanism in place becomes increasingly vital for organizational integrity.

What is Microsoft Defender for Office 365?

Protect your entire Office 365 ecosystem from advanced threats like phishing and business email compromise. By integrating sophisticated threat protection, you can boost productivity and simplify administrative duties while reducing overall ownership costs. Improve the efficiency of your Security Operations by taking advantage of unmatched scalability and effectiveness offered through automation. Deliver a thorough defense for your organization against various attacks throughout the kill chain with a unified collaboration solution. Safeguard against a wide array of targeted and volume-based threats, including ransomware, credential phishing, and advanced malware, through a robust filtering system. Employ cutting-edge AI technology to detect malicious or suspicious content, including files and links, within the Office 365 environment. Keep a vigilant watch on threats across Office 365 with advanced hunting capabilities designed to help identify, prioritize, and analyze potential risks. Additionally, empower your security team with a range of incident response options and automation tools, ensuring your defenses remain strong against evolving threats. This all-encompassing strategy guarantees that your organization is well-equipped to navigate the complexities of modern cybersecurity challenges while maintaining a proactive stance. By continually enhancing your security measures, you not only protect sensitive data but also foster a culture of security awareness within your organization.

Media

Media

Integrations Supported

Azure Marketplace
Classter
CloudFuze
ContraForce
Daylight
Kroll Cyber Risk
Microsoft 365
Microsoft Attack Simulator
Microsoft Office 2021
Microsoft OneDrive
Microsoft SharePoint
Microsoft Teams
NilNexus
OpenText Core MDR
Polarity
Query Federated Search
SAP Store
SureCloud
Union365

Integrations Supported

Azure Marketplace
Classter
CloudFuze
ContraForce
Daylight
Kroll Cyber Risk
Microsoft 365
Microsoft Attack Simulator
Microsoft Office 2021
Microsoft OneDrive
Microsoft SharePoint
Microsoft Teams
NilNexus
OpenText Core MDR
Polarity
Query Federated Search
SAP Store
SureCloud
Union365

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

$2 per month
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

WatchGuard

Date Founded

1996

Company Location

United States

Company Website

www.watchguard.com/wgrd-products/panda-advanced-endpoint-security

Company Facts

Organization Name

Microsoft

Date Founded

1975

Company Location

United States

Company Website

www.microsoft.com/en-us/security/business/siem-and-xdr/microsoft-defender-office-365

Categories and Features

Endpoint Detection and Response (EDR)

Behavioral Analytics
Blacklisting/Whitelisting
Continuous Monitoring
Malware/Anomaly Detection
Prioritization
Remediation Management
Root Cause Analysis

Endpoint Protection

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

Categories and Features

SIEM

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Popular Alternatives

Popular Alternatives

CrowdStrike Falcon Reviews & Ratings

CrowdStrike Falcon

CrowdStrike