Proactive Anticipation, Incident Response and Threat Hunting

Our advanced security solutions monitor, control and process all activity on all endpoints to reveal anomalous behavior patterns of users, machines and processes.
The action of Cytomic hunters and analysts is critical to refine and accelerate the adaptation of our techniques to the evolution of attacks. Nothing escapes us, so nothing affects you.

Threat Hunting Service_
Cytomic’s team of experts monitors the decisions made by our Artificial Intelligence, and investigates the most complex cases to detect attacks using ‘Living off the Land’, evasion or compromise techniques.
This process is included by default in all Cytomic endpoint solutions to raise the level of protection to service level.
Zero-Trust Application Service_
This service monitors and classifies absolutely all the processes of all your company’s endpoints. Detailed and precise visibility of everything that happens in your IT environment.
Enables an unattended “deny-all” security model, with no alerts or delegation, until the process is verified and certified by Cytomic. It definitively breaks the chain of attack.
Cytomic EDR_
Detects what traditional solutions cannot even see
Cytomic EDR detects and effectively responds to any type of unknown malware and file-less or non-malware attacks.
- Technology based on the Zero-Trust Application service, which denies any execution until it is certified as reliable
- Cloud-based architecture and its lightweight single agent, allowing for rapid deployment with little impact.
- Complete and detailed real-time and historical visibility into attacker actions and endpoint behavior.
- Detection of abnormal endpoint behavior (IOAs) by blocking the attacker
- Remote containment from the console to endpoints in a massive way, such as isolating or rebooting computers.

Cytomic EPDR_
All the capabilities of Cytomic EDR with advanced prevention capabilities
It integrates in one single solution, a complete stack of preventive and endpoint protection technologies.
Reinforces EDR capabilities with a full range of protection capabilities with Cytomic EPDR that prevents, detects and responds to any type of known and unknown malware, file-less and non-malware attacks.
- Complete visibility and early detection through continuous monitoring and behavior profiling.
- Cloud-based architecture and its lightweight single agent, allowing rapid deployment with little impact
- In-depth analysis to detect any suspicious activity and to be able to activate protective actions to safeguard the company’s computers and information.
- Accurate and timely response that allows immediate intervention by security teams, focusing efforts on what is really necessary and prioritizing actions.

Cytomic EDR
- Lightweight cloud-based agent
- Real-time endpoint monitoring
- Collective Intelligence lookups in real-time
- Cloud-based big data Analytics
- Zero-Trust App Service
Pre-execution, execution and post-execution - In memory behavior anti-exploits
- Behavioral IOA detection
Cytomic EPDR
- Lightweight cloud-based agent
- Real-time endpoint monitoring
- Collective Intelligence lookups in real-time
- Cloud-based big data Analytics
- Zero-Trust App Service
Pre-execution, execution and post-execution - In memory behavior anti-exploits
- Behavioral IOA detection
- Protection of systems when files are created
- IDS, Firewall and Device Control
- Web browsing and Email protection
- Category-based URL filtering
- Exchange server protection, anti-spam and content filtering
Certifications and Recognitions
CommonCriteria EAL-2+
Security Technology Evaluation
Qualified IT Product
Spanish Cryptologic Center
High “ENS” Rating
Spanish National Security Scheme
Panda Security regularly participates and receives awards for protection and performance from Virus Bulletin, AV-Comparatives, and AV-Test.
Cytomic shares technologies, platforms and services with Panda Security’s solutions, extending its capabilities with the managed services, Threat Hunting and Cytomic Orion.