Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News

11/17/2015
10:30 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Morphisec Debuts Moving Target Defense, Redefines Advanced Threat Protection

Unique prevention & threat intelligence capabilities upend security economics in favor of defender

BE'ER SHEVA, Israel, November 17, 2015: Morphisec today ended its stealth mode with the unveiling of Morphisec Moving Target Defense, a new way for enterprises to defend against targeted and zero-day cyberattacks that exploit application vulnerabilities.

Spearheaded by leading Israeli security experts, Morphisec is offering a powerful and easy-to-use prevention solution that turns the tables on attackers, forcing them to futilely chase after unpredictable moving targets. Morphisec recently closed its Series A round of funding with key investors such as JVP (Jerusalem Venture Partners), GE Ventures (NYSE: GE) and Deutsche Telekom (XETRA: DTE). 

Morphisec’s game-changing security solution leverages the concept of polymorphism, a technique commonly used by attackers to evade traditional security solutions. In addition to allowing enterprises to block unnoticed attacks, Morphisec's real-time investigation tools accurately and instantaneously identify attack fingerprints – one of its big advantages over existing forensic solutions. IT security managers using Morphisec Moving Target Defense can rest assured their network is protected from unknown (zero-day) and attacks which seek to exploit unpatched application vulnerabilities. 

“Patching is one of the biggest headaches for most IT departments. Even more than the time and money patching costs, it creates business disruptions. Hackers know this and take advantage while enterprises become sitting ducks, waiting for the next attack,” said Ronen Yehoshua, co-founder and CEO of Morphisec. “For IT and security managers, we are able to give them back the time they need to do their job instead of constantly worrying about patching and the next unknown attack vector. This is a timeless approach to cyber security. There is no worrying about tomorrow, there is no need to dwell on yesterday – we take care of the problem in the moment.”

The Morphisec Moving Target Defense solution is comprised of a low footprint, “Install & Forget” endpoint client software – Endpoint Protector. The solution runs on all Windows-based endpoints, physical or virtual, and is sold together with an easy to use central management console. Endpoint Protector can be installed on the fly, does not require a reboot, and does not need any updates of rules, signatures or databases. It provides value for any enterprise concerned with advanced attacks, evasive malware in their network, or a lack of protection due to delayed patching. Morphisec also offers deep forensic and threat intelligence capabilities and services.

"Morphisec has developed a game changing solution that essentially nullifies zero-day attacks. Hackers will no longer be able to attain their objectives for companies having deployed the Morphisec technology,” said Stephen Orenberg, Morphisec Advisory Board member and former President of Kaspersky Lab, Inc. “Additionally, Morphisec’s forensic exploit and vulnerability analysis  ensures that enterprises have their vulnerability patching headache under control and in compliance.  These factors, along with zero maintenance requirements and the virtual elimination of false positives, makes Morphisec  the solution of choice for corporations seeking to protect their enterprise.”

In addition to CEO Ronen Yehoshua, Morphisec is led by Chief Business Officer Omri Dotan, Vice President of R&D Michael Gorelik, Chief Science Officer Mordechai Guri, and Vice President Product Netta Schmeidler. Karel Obluk, former CTO and Chief Scientists at AVG Technologies recently joined as an active board member. 

General availability of Morphisec’s enterprise product will coincide with RSA Conference 2016 (Q1 2016). Currently Morphisec successfully conducts PoV (proof of value) trials across a variety of industries, including financial services and telecom. To learn more about Morphisec or schedule a demo, contact Morphisec at [email protected] or 617-209-2552.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Sodinokibi Ransomware: Where Attackers' Money Goes
Kelly Sheridan, Staff Editor, Dark Reading,  10/15/2019
Data Privacy Protections for the Most Vulnerable -- Children
Dimitri Sirota, Founder & CEO of BigID,  10/17/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-18202
PUBLISHED: 2019-10-19
Information Disclosure is possible on WAGO Series PFC100 and PFC200 devices before FW12 due to improper access control. A remote attacker can check for the existence of paths and file names via crafted HTTP requests.
CVE-2019-18209
PUBLISHED: 2019-10-19
templates/pad.html in Etherpad-Lite 1.7.5 has XSS when the browser does not encode the path of the URL, as demonstrated by Internet Explorer.
CVE-2019-18198
PUBLISHED: 2019-10-18
In the Linux kernel before 5.3.4, a reference count usage error in the fib6_rule_suppress() function in the fib6 suppression feature of net/ipv6/fib6_rules.c, when handling the FIB_LOOKUP_NOREF flag, can be exploited by a local attacker to corrupt memory, aka CID-ca7a03c41753.
CVE-2019-18197
PUBLISHED: 2019-10-18
In xsltCopyText in transform.c in libxslt 1.1.33, a pointer variable isn't reset under certain circumstances. If the relevant memory area happened to be freed and reused in a certain way, a bounds check could fail and memory outside a buffer could be written to, or uninitialized data could be disclo...
CVE-2019-4409
PUBLISHED: 2019-10-18
HCL Traveler versions 9.x and earlier are susceptible to cross-site scripting attacks. On the Problem Report page of the Traveler servlet pages, there is a field to specify a file attachment to provide additional problem details. An invalid file name returns an error message that includes the entere...