SANS Institute Examines Intuitive Endpoint Security with a Review of Morphisec

Share Article

Whitepaper examines proactive prevention technology that thwarts the most dangerous threats right out of the box in a lightweight agent

Morphisec Logo

"When I think of intuitive endpoint security, I envision something that is easy and simple to use, and does what it's supposed to do when I ask it to do things. During each step of testing, that's how Morphisec responded to everything I could throw at it."

Morphisec, the leader in Moving Target Defense, today announced the release of “Intuitive Endpoint Security: A SANS Review of Morphisec,” a whitepaper review of Morphisec’s intuitive and responsive solution to endpoint protection by the SANS Institute.

The cybersecurity industry has been saturated with a ‘prevention doesn't work’ mindset over the last decade, leading to a market of bloated tools and agents that consume far too many resources. As a result, companies are unable to afford a dedicated security team or outsource to a managed service. This report re-examines the universal assumption that prevention doesn’t work, by outlining Morphisec’s unique approach to proactive prevention and its ability to integrate with an operating systems' native defenses for streamlined protection.

Matt Bromiley, SANS Digital Forensics and Incident Response Instructor and Analyst, and author of the report said, “It's critical that IT teams continually assess their current tool suites amidst an ever-evolving cybersecurity landscape. As attackers find new ways to evade, you too must find new intuitive ways to harden your enterprise against known and unknown attacks. When I think of intuitive endpoint security, I envision something that is easy and simple to use, and does what it's supposed to do when I ask it to do things. During each step of testing, that's how Morphisec responded to everything I could throw at it.”

“Existing endpoint tools are reactive by attempting to detect every new threat after they have already succeeded. When defenses are reactive and targets are static, adversaries can always learn how to pass through defenses and achieve their goals. You can never win,” said Netta Schmeidler, Vice President of Product at Morphisec, “Moving Target Defense offers an intuitive proactive approach with an environment in which the defenses are proactive and the target is no longer static. It's unpredictable and it works.”

Morphisec delivers an entirely new level of endpoint security for any business with its Moving Target Defense-powered Guard and Shield products. Unlike signature and heuristic-based antivirus that are increasingly bypassed by sophisticated attacks, Morphisec Guard thwarts both file-based malware and fileless threats through a lightweight agent. Morphisec’s advanced threat protection capabilities for fileless and in-memory attacks are now also available under the Morphisec Shield product, which can be installed alongside any other 3rd party antivirus security tool. Morphisec Shield can provide critical prevention capabilities to next-generation antivirus or EDR solutions by bolstering endpoint defenses against attacks designed to bypass existing controls.

Bromiley and Schmeidler discussed the report and the future of attack prevention during a recent SANS webcast. Sans community members can watch a recording of the live webcast at: https://www.sans.org/webcasts/intuitive-endpoint-security-review-morphisec-unified-threat-prevention-platform-115485

About Morphisec

Morphisec delivers an entirely new level of innovation with its Moving Target Defense-powered Unified Threat Prevention Platform - placing defenders in a prevent-first posture against the most advanced threats to the enterprise, including APTs, zero-days, ransomware, evasive fileless attacks and web-borne exploits. Morphisec provides a crucial, small-footprint memory-defense layer that easily deploys into a company’s existing security infrastructure to form a simple, highly effective, cost-efficient prevention stack that is truly disruptive to today’s existing cybersecurity model.

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Kyle Austin
Visit website