Tuesday, May 30, 2023

Intezer Launches Cloud Security Product, Intezer Protect, Leveraging Genetic Malware Analysis Technology

By ET Bureau - January 15, 2020 2 Mins Read

Intezer , Cloud Security , Intezer , Genetic Malware Analysis Technology

New York-based cybersecurity company, Intezer, unveiled its new runtime cloud security product, Intezer Protect, powered by the company’s Genetic Malware Analysis technology.

Intezer Protect continuously monitors the binary code running inside an organization’s cloud servers, alerting the user on unauthorized or malicious software in real-time. The product has no impact on business continuity or performance.

Read more: Nearly Half of Cyber Security Professionals Make Less Than $50K a Year

“During the last two years, we have observed a significant increase in the number of cyberattacks targeting Linux servers,” said Itai Tevet, CEO, and co-founder of Intezer. “This is significant because nearly 90 percent of all cloud servers are Linux. Our technology is often the first to detect sophisticated cyber-attacks—many of which are Linux threats—and we saw a real opportunity to help organizations address their cloud security concerns.”

“Security teams are becoming increasingly concerned with a lack of visibility and control into what’s running inside of their cloud servers,” said Tevet. “Intezer Protect addresses this concern by continuously identifying the genetic origins of all software code running in the cloud infrastructure, while taking into account modern, cloud-native needs such as scalability, performance, and low operational overhead.”

Unlike anomaly detection solutions that often flood security teams with vague and false-positive alerts, Intezer Protect produces only actionable and high confidence alerts, with a clear risk classification for each threat. This requires minimal work from the security team and enables them to quickly prioritize and respond to threats in their cloud infrastructure.

Read more: Peeking into the Future Ready IT Automation Industry

Intezer believes the key to mitigating cyber attacks is detecting and responding to the malicious code running in memory. In order for an adversary to conduct a successful cyber attack and inflict damage, such as stealing data, installing a backdoor, or deleting sensitive materials, they must run malicious code or commands on a victim’s machine—whether within a container or a VM. This is the reason why Intezer’s solution is focused on providing security teams with full visibility into all code executing in runtime on their infrastructure, and protecting against unauthorized and malicious software.

Check Out The New Enterprisetalk Podcast. For more such updates follow us on Google News Enterprisetalk News.


ET Bureau

The platform covers e entire enterprise technology space- including emerging technologies like RPA, AI, cloud, automation, and the entire gamut of digital transformation tools, strategies and management decisions.

Subscribe To Newsletter

*By clicking on the Submit button, you are agreeing with the Privacy Policy with Enterprise Talks.*