FREQUENTLY ASKED QUESTIONS

COMPANY

Our headquarter and R&D is located in Beer Sheva, Israel’s cyber valley. We reside in the gorgeous WeWork center. BTW – We are always on the lookout for bright developers and rising stars in the field. Take a look at our careers section or contact us at jobs@morphisec.com for further information.

DEPLOYMENT

No, not at all. Isn’t that amazing! Just close your running applications, install Morphisec Protector™. That’s it, you are done! Your machine will be immediately protected and Protector, our prevention powerhouse, will conceal vulnerabilities in your applications, web browsers and OS’s and trap any attacks.

MEDIA

Please send Ursula, our Director of Marketing, a short email, and she will take it from there.

Ursula, our Marketing Director, is happy to send you our logo in a suitable format and help you with any other copyrighted images from our site. Please contact her via email.

PRODUCTS

Negligible, we like it slim and fast. The service is only briefly active during application load time. As a result, it has zero impact on performance. We want to keep your employees happy and productive. We secure their machines without disturbing their working environment. No updates, no reboots and no performance lags.

Morphisec provides rich contextual information about the attack from its beginning, including its origin, its behavior, its effect on your machine, whether it is a 0-day or correlates with an unpatched vulnerability.

RESEARCH

Yes. You can contact us at info@morphisec.com and we will explain how to run our scanning service.

We currently conduct sophisticated research in two main areas:

  1. Zero-day attacks
  2. Process and OS internals

TECHNOLOGY

EMET and Morphisec address the same problem, preventing exploits. The similarities end there. Here’s a summary of their differences.

EMET – (Enhanced Mitigation Experience Toolkit) is a toolkit used for exploit prevention. It has several flaws, namely:

  1. Rules must be defined. EMET uses a set of explicit, predefined rules to prevent specific types of attacks (rule per set of attacks).
  2. Applications must be configured to work with it.
  3. EMET has compatibility issues with several applications as it blocks behaviors those applications require.
  4. It requires a large amount of RAM, the system must be rebooted to apply any changes and it significantly impacts performance.
  5. It does not provide forensic information on blocked attacks (*).
  6. It can be bypassed in Windows 7, 8 and 10 (**).

Morphisec takes a completely different approach:

  1. No rules to define
  2. No prior knowledge of the attack required – any access to non-morphed memory area is malicious by default
  3. Application agnostic – works with all applications
  4. Compatible with most existing security solutions
  5. No run-time components and no performance penalty
  6. Provides detailed forensic information that can be used by SIEMs or other security products
  7. Provides insight into the current security status of the organization
  8. Enterprise-grade security solution

 

* LACK OF FORENSIC INFORMATION

EMET is not intended to deliver visibility into organizational security or management of security events; it stops attacks without providing details.  As a result, material insights are missing and organizations cannot form a holistic view. In comparison, Morphisec operates under the premise that an organization requires a continuous and lateral defense. Morphisec provides key attack forensic information such as timeline, organizational spread, user and application dimensions.

** BYPASSING EMET

In addition to the complexity of configuration, management, and performance degradation, EMET can be bypassed by various methods. For example:

 

We do not change the operating system at all. We change how the application loads into the memory as it loads without affecting anything in the application.

ASRL is quite limited in its approach and fairly easy for attackers to handle.

At Morphisec, we view ASLR as the predecessor of a multi-variable, modern Moving Target Defense approach.

Morphisec Endpoint Security delivers protection that overcomes the limitations  of ASRL.  In addition, our solution offers a full management system, and is able to provide rich forensic information and intelligent classification and fingerprinting of attacks for actionable remediation directives.

Read more about ASLR in our factsheet: ASLR – What it is and what it isn’t.

Our technology can protect applications running on Windows XP. Please contact us at info@morphisec.com for additional information.

food for thoughts

“With Morphisec, we found a rare combination of powerful prevention and total compatibility with the Motoman working environment. In my experience, I have never seen a piece of enterprise security software that has been so easy and fast to deploy with practically zero configuration required and no effect on endpoint performance. We are very pleased with our decision to partner with Morphisec.”

Jeff Magnuson

I.T. Architect at Yaskawa America Inc., Motoman Robotics Division

An ounce of prevention is worth a pound of cure.

Benjamin Franklin
Benjamin Franklin

I am convinced that there are only two types of companies: those that have been hacked and those that will be. And even they are converging into one category: companies that have been hacked and will be hacked again.

Robert S. Mueller
Robert S. Mueller

Director Federal Bureau of Investigation

Moving Target Defense enables us to create, analyze, evaluate, and deploy mechanisms and strategies that are diverse and that continually shift and change over time to increase complexity and cost for attackers, limit the exposure of vulnerabilities and opportunities for attack, and increase system resiliency.

Executive Office of the President, National Science and Technology Council

December 2011

All war is based on deception.
The supreme art of war is to subdue the enemy without fighting.

Sun Tzu
Sun Tzu

Chinese general, military strategist, and philosopher