- Mar 1, 2014
- 1,708
Or request the testers to test the product.Guess it will be easy for me to reach 100 post this way and gain access to the so called fresh malware. Hehe
@cruelsister @Evjl's Rain @MalwareBlockerYT
Please provide comments and solutions that are helpful to the author of this topic.
Or request the testers to test the product.Guess it will be easy for me to reach 100 post this way and gain access to the so called fresh malware. Hehe
The payloads were most probably blocked because they were not whitelisted. This is the standard default\deny behavior of a firewall, not an AV.
Three questions if I use it on my laptop
1) Is Panda AV strong enough as compared to Kaspersky, BD, Avast etc
2) If offline how can it protect my system? If cannot then I'll need another set of of AV?
3) Is this software totally cloud-based?
Thanks
What specific Kaspersky product were/are you using?We are using Kaspersky and in the midst of transitioning to PAD360. 6 zero day ransomware case hit our users with Kaspersky fully loaded. We were clueless. We studied the actual problem and the limitations of our current security. 2 cases was by targeted attacks. Our Barracuda firewall didn't detect anything as well. So you justify the reason why we moved to Panda. since endpoint is the target and the entry point for those zero day ransomware, we focusing on changing the endpoints security
How about the answers to my questions 2) & 3)?We are using Kaspersky and in the midst of transitioning to PAD360. 6 zero day ransomware case hit our users with Kaspersky fully loaded. We were clueless. We studied the actual problem and the limitations of our current security. 2 cases was by targeted attacks. Our Barracuda firewall didn't detect anything as well. So you justify the reason why we moved to Panda. since endpoint is the target and the entry point for those zero day ransomware, we focusing on changing the endpoints security
my organization, there are some 50 locations with bad internet connection, and so we installed Panda, get it updated and protected for the very first time, threw all the malware and the most famous pendrive virus.. all SAFE AND SECURE. we also installed to our mobile laptops so as to track their usage, virus activity, threats report... For existing malware, the remediation do not require IT staff to attend to them to do manual scanning amd removal. Everything is done through the cloud by sending a command to the agent. Results of scanning and removal can be seen through the cloud. Can seperate the policy by departments or individuals. It has built in web content filtering and protection. Cloud for management and policy and reports and command. When your are offline and not updated... You are still protected by it's built-in AV and whitelisting mode. So basically, unknown malware or programs or bad behaviour will be denied.How about the answers to my questions 2) & 3)?
Thanks again
Kaspersky Endpoint Security 10What specific Kaspersky product were/are you using?
I assume that it has default-deny option, which would have prevented the infection. Was it turned on?Kaspersky Endpoint Security 10
You just need SRPsThanks for clarifying for me about hybrid-analysis.com
However, 900+ machines of Mac and Windows under Active Directory Win Server 2012 with GPO enforced. Protected with Acronis for system rollback. Used to enforced to block all exe and scripts under Users context but that's just overkill. So we used Panda to control device access, programs as well while protecting users from zero-day attacks and malware.
maybe yes, maybe not; many of our malwares are FUD; AV are based on signature , so they are always behind release of zero-days; they may fill the weakness by using BB/HIPS or whatever features but those will sooner or later need user interaction, which is not admissible in corporate environment.I am pretty confident that PAD360 can block all the viruses and malware samples in this website.
I won't use Acronis, it is too bloated. i talk about light virtualization/rollback application like rollback RX or Deepfreeze/Shadow Defender , they create a virtual snapshot of the system and the clean baseline is reloaded either every boot or when the admin/user want to.Oh and System Rollback wont work for documents and spreadsheets that has been modified before the next backup. That's why we need prevention and not action after infection.
It is why major corporation and ex- admin like me are using SRPs , they are designed to block everything not whitelisted by the admin. we don't bother with AV and their obsolete signature model. We don't have time to monitor every popup resulting for from a lack of info from the AV. SRP block everything not already installed. that is it. and ransomware have no chance of even executing.Oh and....if doxware is a future problem....any type of backup won't work....you need total prevention. Ransomware problem plus exposing the data to the public - backup is total useless. Even if you already recovered the data, but the copy of your files and databases is in their server ready to be exposed..you won't be able to do anything unless you can trace their command server and report it to the authority or just simply pay them so they will not expose the data.
Nope , rules are rules, you have to satisfy the requirements.And by the way, if we users has less than 100 post in this website, the best and lots of samples so far is only hybrid-analysis.com..right? While waiting to reach for 100 post....so can you suggest a better solution for now while answering to another user's question inquiry on where to download samples?
Exactly.
Your reaction to the firewall is nevertheless... priceless
You are in a security forum , we all know that since ages, Heimdall's representative is a member of MT and asked us about a security course they were creatingBut I am sure it can't prevent fileless attack. Do you know what is fileless attack? Here's an info for you. Understanding Fileless Malware Infections – The Full Guide - Heimdal Security Blog
You are in a security forum , we all know that since ages, Heimdall is member of MT and ask us about a security course they were creating
what can't prevent fileless attacks?