Independent security consultants MDSec tested Morphisec Knight and found it stops MITRE ATT&CK tactics and techniques commonly used by threat actors.
“We found Morphisec Knight for Linux to be an effective and comprehensive solution for mitigating native code-based attacks on the Linux platform.”
Morphisec Knight blocks remote, unauthorized or weaponized code execution, living off the land (LoTL) or man-in-the-machine (MiTM) privilege escalation, polymorphic defense evasion, and other advanced tactics.
Morphisec Knight for Linux uses Moving Target Defense technology to prevent attacks and minimize false positive alerts. In addition, Knight's lightweight agents use few resources, need no reboot, and are optimized for both cloud workload protection (CWPP) and on-premise.
Morphisec Knight augments server EDR with enhanced alert and threat intelligence for audits and compliance reporting. Knight prevents in-memory attacks to lower risks for fines, lawsuits, and brand damage.
In an era of digital transformation and cloud migration, over 90 percent of cloud servers and 70 percent of web servers rely on Linux. Supply chain attacks, cryptojacking, spyware, data theft, extortion, ransomware, and other malicious activities are skyrocketing. Cybercriminals are using more advanced tactics and techniques against Linux servers. Morphisec Knight for Linux reduces the runtime attack surface for Linux servers on premise or in the cloud (CWPP), complementing and boosting the protection of other security solutions.
Knight for Linux is powered by Morphisec’s revolutionary and patented Moving Target Defense (MTD) technology.
Prevents supply chain, cryptojacking, spyware, data theft, zero-day, polymorphic, and ransomware attacks
Ultra lightweight cloud and server workload agent needs no reboot or downtime to deploy or maintain, and doesn’t impact performance
Set-and-forget application runtime protection reduces EDR alerts and false positives to reduce staff needs
Augments EDR/RASP/AV for bare metal, cloud, on-premise, VM, AWS, and Azure environments
Next-gen virtual patching alternative prevents zero-day attacks until patching is complete
Independent penetration tests proved Knight’s effectiveness against MITRE ATT&CK tactics and techniques commonly used by sophisticated attackers