Search
Homepage Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Cisco Partner Summit Digital 2020 Lenovo Tech World Newsroom HPE Zone Masergy Zenith Partner Program Newsroom Dell Technologies Newsroom Fortinet Secure Network Hub Hitachi Vantara Digital Newsroom IBM Newsroom Juniper Newsroom The IoT Integrator Lenovo Channel-First NetApp Data Fabric Intel Tech Provider Zone

10 Hottest Container Security Tools In 2019

Here's a look at how companies like Aqua, Qualys, and Twistlock find vulnerabilities, block threats, maintain compliance, and examine activity to secure containers at their most vulnerable point.

Back 1 ... 5   6   7   8   9   ... 11 Next
photo

Polyverse Polymorphic Linux

Polyverse takes source code and runs it through a polymorphic compiler, changing register usage, function locations, and import tables to produce individually unique binaries that are semantically equivalent. These binaries are then applied to the totality of the Linux stack.

The product reduces attacker's window of opportunity by increasing their uncertainty, Polyverse said. By harnessing moving-target defense, the company creates strategic entropy in software systems.

Polyverse Polymorphic Linux is immune to memory exploitation attacks, which accounted for 80 percent of the high- or medium-severity incidents in 2017. The product can be deployed in less than five minutes, according to Polyverse.

 
 
Back 1 ... 5   6   7   8   9   ... 11 Next

sponsored resources