CLOAK THE TARGET SYSTEM FROM ATTACKERS

As an application, web browser or OS loads to the memory space, our polymorphic engine scrambles the inner structure of the process, its calls to library functions, and library addresses.
Each run is unique, per process and per process instance. This makes the memory unpredictable to attackers.

CLOAK THE TARGET SYSTEM FROM ATTACKERS

RECOGNIZE THE MORPHED APPLICATION STRUCTURE

Simultaneously, the process is made aware that there is a legitimate morphed application structure. The application runs as usual on the new structure while Morphisec keeps a dummy of the original to use as a trap.

RECOGNIZE THE MORPHED APPLICATION STRUCTURE

DECEIVE AND NEUTRALIZE ATTACKERS

Malicious code fails to execute since it lacks knowledge of the new structure and cannot access any of the functions it needs. Attacks continue to target the original structure, unaware that it’s now a decoy.

DECEIVE AND NEUTRALIZE ATTACKERS

TRAP AND MANAGE

Attacks on the dummy structure find themselves trapped. Blocked attacks are logged and reported to the Morphisec Management Dashboard or to SIEM for forensics analysis.

TRAP AND MANAGE

Step 01

CLOAK THE TARGET SYSTEM FROM ATTACKERS

As an application, web browser or OS loads to the memory space, our polymorphic engine scrambles the inner structure of the process, its calls to library functions, and library addresses.
Each run is unique, per process and per process instance. This makes the memory unpredictable to attackers.

CLOAK THE TARGET SYSTEM FROM ATTACKERS

step 02

RECOGNIZE THE MORPHED APPLICATION STRUCTURE

Simultaneously, the process is made aware that there is a legitimate morphed application structure. The application runs as usual on the new structure while Morphisec keeps a dummy of the original to use as a trap.

RECOGNIZE THE MORPHED APPLICATION STRUCTURE

step 03

DECEIVE AND NEUTRALIZE ATTACKERS

Malicious code fails to execute since it lacks knowledge of the new structure and cannot access any of the functions it needs. Attacks continue to target the original structure, unaware that it’s now a decoy.

DECEIVE AND NEUTRALIZE ATTACKERS

step 04

TRAP AND MANAGE

Attacks on the dummy structure find themselves trapped. Blocked attacks are logged and reported to the Morphisec Management Dashboard or to SIEM for forensics analysis.

TRAP AND MANAGE

MORPHISEC PROTECTOR

Protector is a service that runs autonomously on Windows-based endpoints and servers, physical or virtual, and securely communicates with an on-premise or cloud-based management console for reporting purposes. Protector safeguards commonly attacked applications out of the box and its application agnostic nature makes it easy to add any other application.

DOWNLOAD OUR SOLUTION BRIEF TO LEARN MORE

MORPHISEC PROTECTOR

MORPHISEC DASHBOARD

A clear, powerful dashboard, with a set of role-based views, lets your users:

  • View current organizational attack status at a glance
  • Easily view, filter and sort information
  • Manage endpoint Protectors
  • View high level attack information
  • Gain additional insights for conducting forensic analysis
DOWNLOAD OUR TECHNICAL DATASHEET TO LEARN MORE

 

MORPHISEC DASHBOARD

DOES ALL THE HEAVY LIFTING

Morphisec Protector is a lightweight 2 MB DLL install-and-forget service that provides heavy duty protection but requires no maintenance from you.

  • Stops unknown as well as known attacks
  • Deterministic - no rules or heuristics that introduce error
  • No false alarms that divert resources and obscure real threats
  • Application agnostic – protects all your applications with no need for special configurations
  • Extremely low footprint with no run time component and no impact on endpoint performance
  • Multi-tiered, on premise or cloud-based application compatible with all Windows platforms
  • Real-time, proactive protection at the moment of attack
  • Runs autonomously; protects employee machines in and outside company network
  • Install on the fly, without rebooting
  • Future-proofs your endpoints against zero-day vulnerabilities
  • No need to update rules, signatures or databases, and no learning algorithms
  • Complements and cooperates with other security agents

MORPHISEC’S CORE ARCHITECTURE

Morphisec is a multi-tiered Windows Service application. Its highly scalable, enterprise-class architecture can support an organization of any size, from a few endpoints up to tens of thousands, in a single or multi-site configuration. It supports complex and heterogeneous IT environments, with a structure designed to deliver fault tolerance while providing high availability. Blocked attacks are logged and reported to the Morphisec Management Dashboard and/or to the organizational SIEM for forensics analysis.

MORPHISEC’S CORE ARCHITECTURE

WHAT OUR CUSTOMERS ARE SAYING