• About Us
  • Advertising
  • Digital Magazine
  • Supplements
  • Media Pack
  • Privacy Policy
  • Contact us
CXO Insight Middle East
  • News
  • Opinion
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
    • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CXO50 Oman
    • CXO50
    • ICT Awards
      • Dubai 2025
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect 2025
    • Channel Awards 2024
    • All events
  • GITEX
  • Digital Magazine
No Result
View All Result
CXO Insight Middle East
  • News
  • Opinion
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
    • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CXO50 Oman
    • CXO50
    • ICT Awards
      • Dubai 2025
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect 2025
    • Channel Awards 2024
    • All events
  • GITEX
  • Digital Magazine
No Result
View All Result
CXO Insight Middle East
No Result
View All Result

Plugging the gaps

by CXO Staff
December 2, 2021
in News
cybersecurity

What is Virsec’s approach to cybersecurity?

Virsec has been creating a lot of buzz globally, primarily because of our approach to making cyber threats irrelevant. We make sure we understand the enterprise software running within enterprises at all levels – host, memory, or Web. As a result, we can ensure that existing vulnerabilities – both known and unknown ones – don’t get exploited. This is why customers have started adopting us and realise the legacy approach to cybersecurity isn’t working. They need a solution that can detect and prevent attacks that occur during runtime.

How do you define runtime protection?

 Today, if you look at the recent breaches, cybercriminals exploit runtime in the application infrastructure and corrupt legitimate processes. Most of the other cybersecurity tools can’t see threats at this level and protect you from the deep, vulnerable, blind spots in your applications or software. What makes us fundamentally different from others in this space is we look at it in real-time when the application is executing in process memory. We can look at the code execution in memory, control-flow integrity and ensure it does not get detailed. I will give you an example of a large government organisation here. They were dependent on legacy solutions and got breached even after having multiple layers of security. They reached out to us after the attack and wanted a solution to protect against unknown zero-day attacks. Today’s fileless attacks make memory the new battleground, and bad guys are trying to exploit vulnerabilities during runtime. The other security vendors treat this runtime – process memory- as a black box. In our case, due to our patented technology, we can look into memory, focus on what applications should be doing, and catch any deviation to the execution flow of legitimate code in milliseconds.

How does your platform work? Do you deploy agents?

We would like to call them memory sensors, not agents, because it is so lightweight and reside on memory, protecting system software from memory-based, binary attacks. At the same time, it does look at the file system. Our approach is to focus on the good rather than the bad. So the signatures are basically formed within the customer environment and tailor-made for that particular customer. It’s all automated in real-time. This lightweight agent can detect threats in real-time during runtime because we primarily know the application’s DNA and anything outside of it such as files, MSI, libraries, and scripts.

If users have a solution like an XDR, do they still need a platform like Virsec’s?

 XDR is definitely good for endpoint protection, but it is not meant for servers. XDR was extended to servers because of the lack of solutions tailor-made for servers – and it can’t protect against memory-level attacks, which happen now and then. However, we can complement XDR and provide front-line protection for mission-critical apps and infrastructure. Even if you don’t have an XDR, the Virsec platform alone is enough server security.

Are you seeing more and more server-side attacks?

There might be more than a million threats being created every day. But most of these are commodity, and what makes news is primarily those few hundreds, which are going undetected. These are primarily fileless attacks that launch malicious code directly from memory and get in without placing any malware on the system. Cybercriminals are spending weeks and months crafting such malicious code and are not going to target endpoints. Instead, they are targeting the crown jewels of the organisation; they use very sophisticated methods to move laterally to infiltrate the most high-value server assets. And this is where you need security the most.

Tags: featured1Virsec
ShareTweet

Related Posts

Omnix launches AI-first managed services to transform next-gen IT support
Business

Omnix launches AI-first managed services to transform next-gen IT support

Omnix International announces the launch of its AI-first Managed Services offerings. These next-generation IT support offerings embed artificial intelligence, automation,...

July 7, 2025
NIO’s innovations set new benchmarks for electric mobility
Future

NIO’s innovations set new benchmarks for electric mobility

NIO sets a new benchmark in intelligent mobility in the Middle East. With a full-stack suite of smart computing, software,...

July 7, 2025

Discussion about this post

Latest Issue

Securing critical infrastructure in an era of evolving threats

Securing critical infrastructure in an era of evolving threats

July 7, 2025
Recorded Future on powering resilience with intelligence-led security

Recorded Future on powering resilience with intelligence-led security

July 7, 2025
A journey of growth and trust

A journey of growth and trust

July 7, 2025

The most trusted source of strategic intelligence for IT decision makers in the Middle East.

About

  • About Us
  • Advertising
  • Digital Magazine
  • Supplements
  • Media Pack
  • Contact Us

Policies

  • Privacy Policy

© 2024 – CXO Insight Middle East. All Rights Reserved.

Facebook-f X-twitter Linkedin
Separated they live in Bookmarksgrove right at the coast of the Semantics, a large language ocean. A small river named Duden.

About

  • About Us
  • Site Map
  • Contact Us
  • Career

Policies

  • Help Center
  • Privacy Policy
  • Cookie Setting
  • Term Of Use

Join Our Newsletter

© 2024 – CXO Insight Middle East. All Rights Reserved.

Facebook-f Twitter Youtube Instagram

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Join our mailing list
Sign up here to get the latest news, updates and special offers delivered directly to your inbox.
No Result
View All Result
  • News
  • Opinions
  • Business
    • Industries
      • Transport
      • Retail
      • Government
      • Real Estate
      • Education
      • Energy
      • Banking and Finance
  • Channel
  • Future
    • Tech
    • Gadgets
    • Science
    • Space
    • Sustainability
  • Events
    • Channel Insights Summit 2025
    • Insight Innovation Summit
    • CX50 Oman
    • CXO50
    • ICT Awards
      • Dubai
      • Saudi Arabia
    • Cyber Strategists Summit
    • Cloud Connect 2025
    • Channel Awards 2023
    • All events
  • Videos
  • GITEX GLOBAL
  • Digital Magazine

© 2024 - CXO Insight Middle East. All Rights Reserved.