Virsec, Virsec Security Platform (VSP)

Additional Info

CompanyVirsec
Websitehttps://www.virsec.com/
Company size (employees)100 to 499

Overview

The Virsec Security Platform is the first and only application-aware workload protection platform that incorporates System Integrity Assurance, Application Control and Memory Protection into a single solution. Virsec delivers in-depth visibility across the entire workload in any environment and blocks known and unknown threats that are undetected by heuristic and endpoint security solutions.
Virsec’s patented technology maps the legitimate execution of all applications, file libraries, operating systems, processes, and memory. Virsec instantly spots any deviations during runtime, which are positive signs of attack. The Virsec solution detects and stops advanced and evasive fileless and zero-day techniques, including buffer overflow attacks, stack smashing, DLL injections, return-oriented programming (ROP) and ROP gadgets, side channel attacks and corruption of configuration data.
Virsec also offers full-stack application security for Managed Security Service Providers (MSSP) that streamlines the management of the Virsec platform, enabling MSSPs and, ultimately, their end-users, to secure enterprise workloads and centralize the management of customer deployments and gain a deeper level of visibility of those deployments in one dashboard. These MSSPs can onboard and manage Virsec workload protection for customers from one console, avoiding an entire step of deploying a Central Management System for every new customer.

How we are different

Virsec stops attacks during execution, in real-time to keep your applications on track. Rather than endlessly chasing elusive perimeter threats, Virsec positively protects your critical applications from the inside.


- Stops memory-based attacks MITRE categorizes as the most dangerous and blocks execution of malicious code without prior knowledge
- Ensures control flow integrity going far beyond EPP/EDR
- Delivers direct visibility into memory misuse to support incident response