• About Us
  • Advertising
  • Digital Magazine
  • Supplements
  • Media Pack
  • Privacy Policy
  • Contact us
CXO Insight Middle East
  • News
  • Opinion
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
    • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Awards
      • 2025
      • 2024
      • 2023
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CXO50 Oman
    • CXO50
    • ICT Awards
      • Dubai 2025
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect 2025
    • All events
  • Digital Magazine
  • GITEX GLOBAL
No Result
View All Result
CXO Insight Middle East
  • News
  • Opinion
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
    • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Awards
      • 2025
      • 2024
      • 2023
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CXO50 Oman
    • CXO50
    • ICT Awards
      • Dubai 2025
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect 2025
    • All events
  • Digital Magazine
  • GITEX GLOBAL
No Result
View All Result
CXO Insight Middle East
No Result
View All Result

Determined to protect

by CXO Staff
March 24, 2022
in News
Determined to protect

What are you showcasing at GISEC this year?

We are exhibiting our new protection platform. And that is the keyword – it is all about protection. In cybersecurity, what we need more than ever before is protection. We have a lot of detection and a lot of response. But in between these two is the attack. So, we launched a product that we call deterministic protection, which protects applications in runtime.

Why is runtime protection important?

Well, it’s important because no matter how secure you develop software, you always have to move it into production. And the minute you move it into production, it’s vulnerable to unknown attacks. And so we had to come up with something that the industry hasn’t done before – to protect workloads from being attacked while it is running. But to do that, you have to do it a little differently because you can’t analyse its behaviour. You have to know the software’s intention based on how the developer has developed it. And so we created the ability to map software and then fully protect it while it’s running.

Why do you think EDR or EPP is insufficient to protect application workloads?

There’s been an increasing number of reports that EDR and endpoint protection products have inherent limitations. One of the limitations is they can’t protect your environment in real-time. They can only detect threats if it is something they’ve seen before and respond once they see a pattern emerging. But what’s happening in the middle is that attacks are getting through these EPP or EDR products. Sometimes they’re getting through because the products had never seen it before because they’re based on analytics. Or the attacks are getting through because it takes a while for these products to respond. So there’s a gap there. Our deterministic protection that we call DPP is based on the premise that you need to protect your applications or software by detecting anomalous behavior in real-time and then blocking it.

What kind of threat vectors should we watch out for this year?

The number one threat is remote code execution attacks, which is really a fancy word for an attacker to insert malicious code into the software they want to attack. And the problem is these attacks this year are coming in deeper into an area called the memory or the user space in applications. And that, unfortunately, is completely unprotected.

Do you see supply chain attacks as well?

Supply chain attacks and ransomware attacks are probably the top two. As you know, ransomware attacks are skyrocketing and gaining prevalence worldwide. And they are usually remote code execution attacks that weaponises ransomware or supply chain poisoning attacks. The most famous one was, of course, the SolarWinds breach. But if you think about it, any company has hundreds of suppliers, customers, and relationships. If you look at how vulnerable the interaction is between their own systems and the software of all their suppliers. It’s a very challenging place.

Are you leveraging AI and ML?

In our portfolio of products, the core of our technology is called determinism. It’s a departure from artificial intelligence and analytics because analytics might probably protect you. That’s why you hear the word probabilistic. Deterministic is determining if you’re being attacked and then protecting you. So it is a stronger approach.

Tags: Cybersecurityfeatured4Virsec
ShareTweet

Related Posts

Veeam at GITEX 2025: Championing ‘Radical Resilience’ with new data resilience innovations
Future

Axis Communications to unveil next-gen intelligent security technologies at Intersec Dubai 2026

December 19, 2025

The global security landscape is undergoing a profound transformation - shifting rapidly from traditional, reactive surveillance to a new era...

UiPath announces partnership with Snowflake
Business

Dynatrace expands collaboration with Google Cloud

December 19, 2025

Dynatrace announced it has expanded its collaboration with Google Cloud to help empower enterprises and developers to harness the full...

Discussion about this post

Latest Issue

Veeam at GITEX 2025: Championing ‘Radical Resilience’ with new data resilience innovations

Axis Communications to unveil next-gen intelligent security technologies at Intersec Dubai 2026

December 19, 2025
UiPath announces partnership with Snowflake

Dynatrace expands collaboration with Google Cloud

December 19, 2025
Why the UAE is becoming the go-to place for startups and investors

Why the UAE is becoming the go-to place for startups and investors

December 19, 2025

The most trusted source of strategic intelligence for IT decision makers in the Middle East.

About

  • About Us
  • Advertising
  • Digital Magazine
  • Supplements
  • Media Pack
  • Contact Us

Policies

  • Privacy Policy
© 2025 – CXO Insight Middle East. All Rights Reserved.
Facebook-f X-twitter Linkedin
Separated they live in Bookmarksgrove right at the coast of the Semantics, a large language ocean. A small river named Duden.

About

  • About Us
  • Site Map
  • Contact Us
  • Career

Policies

  • Help Center
  • Privacy Policy
  • Cookie Setting
  • Term Of Use

Join Our Newsletter

© 2024 – CXO Insight Middle East. All Rights Reserved.

Facebook-f Twitter Youtube Instagram

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Join our mailing list
Sign up here to get the latest news, updates and special offers delivered directly to your inbox.
No Result
View All Result
  • News
  • Opinions
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
  • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Awards
      • 2025
      • 2024
      • 2023
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CX50 Oman
    • CXO50
    • ICT Awards
      • Dubai
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect 2025
    • All events
  • Videos
  • GITEX GLOBAL
  • Digital Magazine

© 2025 - CXO Insight Middle East. All Rights Reserved.