The Virsec Security Platform (VSP)

Deny-All, Allow-on-Trust

VSP provides Zero Trust Runtime Defense that prevents threat actors from exploiting vulnerabilities.

How does the Virsec Security Platform (VSP)
improve your security posture?

VSP prevents malicious code from executing.
With automated trust intelligence, threat actors are prevented from exploiting vulnerabilities through remote code execution, living-off-the-land attacks, and other system intrusions.

VSP’s Host Protection
Ensures that only authorized, trusted, and safe executables are running on your server.
VSP-Comp-Arrows-2
VSP’s Memory Protection
Protects the proper execution
of applications with a documented control flow for every executable, stopping any deviation during runtime.
VSP’s Web Protection
Protects web workloads from known and unknown, zero-day, memory,fileless, and file-based attacks.

Experience Fast Time-to-Value

See ROI in Moments,
not Months

Virsec-Icon-Reduce-Risk

Reduce Risk

Eliminate open attack surfaces, like unpatched vulnerabilities, to reduce the impact of zero-day cyber threats to applications and workloads and save costs from the impact of a breach.

Virsec-Icon-Tools

Tools & Services Consolidation

Consolidate server-based security tools to reduce configuration, licensing, and alert fatigue. Avoid costly extended security updates (ESUs) on legacy Windows OS. 
Virsec-Icon-Save-Money

Reduce Human Capital

Reduce the human capital required to analyze relentless vulnerability scans, and significantly reduce false positives.

Proactive Zero Trust Runtime Defense

The Virsec security architecture is a distributed system of light-weight probes within each workload to proactively monitor the security posture across the organization in real-time.
The Virsec Security Platform (VSP) achieves zero adversary dwell time, instantly preventing malicious code, scripts, or files from running on your workloads. 
NON-VIS COMMENT - THIS ACCORDION SECTION IS FOR DESKTOP (SABENE)

Evaluating

Protection Threat Vectors

With compensating controls, organizations have proactive protections against sophisticated cybersecurity attacks at multiple stages of the kill chain to prevent vulnerabilities from being exploited.
OWASP Web Application Attacks
Requirements Criteria
OWASP

 

  • Cross-site request forgery (CSRF)
  • SQL injection, command injection, CRLF injection
  • XML injection
  • SQL injection, XSS, or command injection
  • Continuous policy-based authentication
  • URL - SQL logging
  • Remote file inclusion (RFI)


 

Ransomware
Requirements Criteria
Ransomware

 

  • Instant protection at runtime
  • Efficacy against known & unknown malware
  • Coverage against MITRE and OWASP attack types
  • Low false positives and false negatives
  • Dwell time down to milliseconds
  • Does not require daily signature updates
  • Protection across operating systems
Remote Code Execution (RCE)
Requirements Criteria
RCE

 

  • Protects against unpatched vulnerabilities
  • Protects against unknown zero-day vulnerabilities
  • Implements a “default deny” approach
  • Executable allowlisting to prevent unauthorized code execution
  • Prevents memory-based attacks
  • Prevents fileless and living-off-the-land attacks
Zero-Day Attacks
Requirements Criteria
Ransomware

 

  • Instant protection at runtime
  • Efficacy against known and unknown malware
  • Coverage against MITRE and OWASP attack types
  • Low false positives and false negatives
  • Dwell time down to milliseconds
Unpatchable Legacy Workloads
Requirements Criteria
unpatch-legacy-workloads-2

 

  • Instant protection at runtime
  • Protects legacy Windows and Linux server        operating systems
  • Efficacy against known and unknown malware
  • Coverage against MITRE and OWASP attack types
  • Low false positives and false negatives
  • Dwell time down to milliseconds
Fileless Attacks
Requirements Criteria
File-less-attacks

 

  • Precise access control for PowerShell, Bash, & other native scripting tools
  • Precise protection via a deterministic approach
  • Low false positives and false negatives
  • Efficacy rate of true positives
  • Dwell time down to milliseconds
NON-VIS COMMENT - THIS ACCORDION SECTION IS FOR MOBILE (SABENE)

Evaluating

Protection Threat Vectors

With compensating controls, organizations have proactive protections against sophisticated cybersecurity attacks at multiple stages of the kill chain to prevent vulnerabilities from being exploited.
OWASP Web Application Attacks

RequirementsOWASP

 

Criteria

 

  • Cross-site request forgery (CSRF)
  • SQL injection, command injection, CRLF injection
  • XML injection
  • SQL injection, XSS, or command injection
  • Continuous policy-based authentication
  • URL - SQL logging
  • Remote file inclusion (RFI)
Ransomware

Requirements
Ransomware

 

Criteria

 

  • Instant protection at runtime
  • Efficacy against known & unknown malware
  • Coverage against MITRE and OWASP attack types
  • Low false positives and false negatives
  • Dwell time down to milliseconds
  • Does not require daily signature updates
  • Protection across operating systems

Ransomware

Remote Code Execution (RCE)

Requirements

RCE

 

Criteria

 

  • Protects against unpatched vulnerabilities
  • Protects against unknown zero-day vulnerabilities
  • Implements a “default deny” approach
  • Executable allowlisting to prevent unauthorized code execution
  • Prevents memory-based attacks
  • Prevents fileless and living-off-the-land attacks
Zero-Day Attacks

Requirements

Ransomware

 

Criteria

  • Instant protection at runtime
  • Efficacy against known and unknown malware
  • Coverage against MITRE and OWASP attack types
  • Low false positives and false negatives
  • Dwell time down to milliseconds
Unpatchable Legacy Workloads

Requirements

unpatch-legacy-workloads-2

 

Criteria

  • Instant protection at runtime
  • Protects legacy Windows and Linux server        operating systems
  • Efficacy against known and unknown malware
  • Coverage against MITRE and OWASP attack types
  • Low false positives and false negatives
  • Dwell time down to milliseconds
Fileless Attacks

Requirements

File-less-attacks

 

Criteria

  • Precise access control for PowerShell, Bash, & other native scripting tools
  • Precise protection via a deterministic approach
  • Low false positives and false negatives
  • Efficacy rate of true positives
  • Dwell time down to milliseconds

Trust Intelligence

Built-in Trust Intelligence validates the reputation and provenance (origin) of host workload dependencies for authorization to execute while denying all unauthorized code from running to prevent ransomware and malware from exploiting a vulnerability.
How does Trust Intelligence fit within Zero Trust?

Zero Trust Runtime Defense Stops
Zero-day and One-day Attacks

"Detecting an attack inspired by a known threat actor should be the floor for what security products can do, not the ceiling."

~ Allie Mellen, Principal Analyst, Forrester Research

Endpoint Detection and Response (EDR) ability to protect against the risk of a breach is severely degraded when subjected to unknown cyber attacks.
NON-VIS COMMENT - THIS TABLE IS FOR DESKTOP (SABENE)
green-check-icon
Passed 100%
yellow-line-icon
Inconsistent Protection
Orange-X-icon-1
Failed Protection
MITRE Tactics & Techniques
Execution
Persistence
Privilege Escalation

Defense Evasion

Credential Dumping
Discovery
Collection
Impact

Virsec Security Platform

100% Prevention

green-check-icon
Command Line Interface
Executable Binary

green-check-icon

Create Account

green-check-icon

Process Injection

green-check-icon

Hide Artifacts
Signed Binary Proxy Executable
Process Injection

green-check-icon

Credential Dumping

green-check-icon

Software Discovery
System Network Configuration
System Network Connection
System Owner / User Discovery

green-check-icon

Automated Collection
Data from Local System

green-check-icon
Inhibit System Recovery
Account Access Removal
Data Encrypted for Impact

Leading EDR

42% Prevention

 

 .yellow-line-icon.green-check-icon
Command Line Interface
Executable Binary

 

yellow-line-icon

Create Account

 

yellow-line-icon

Process Injection
 Orange-X-icon-1.yellow-line-icon
Hide Artifacts
Signed Binary Proxy Executable
Process Injection

 

green-check-icon

Credential Dumping

 Orange-X-icon-1
Software Discovery
System Network Configuration
System Network Connection
System Owner / User Discovery

 

Orange-X-icon-1Automated Collection
Data from Local System

 Orange-X-icon-1.yellow-line-icon.green-check-icon
Inhibit System Recovery
Account Access Removal
Data Encrypted for Impact
NON-VIS COMMENT - THIS TABLE IS FOR MOBILE (SABENE)

Execution

green-check-icon

VSP
Command Line Interface
Executable Binary

 

yellow-line-icon.green-check-icon
Leading EDR
Command Line Interface
Executable Binary

Persistence

green-check-icon

VSP
Create Account

yellow-line-icon

Leading EDR
Create Account

Privilege Escalation

green-check-icon

VSP
Process Injection

yellow-line-icon

Leading EDR
Process Injection

Defense Evasion

green-check-icon

VSP
Hide Artifacts
Signed Binary Proxy Executable
Process Injection

 Orange-X-icon-1.yellow-line-icon

Leading EDR
Hide Artifacts
Signed Binary Proxy Executable
Process Injection

 

Credential Dumping

green-check-icon

VSP
Credential Dumping

 
green-check-icon

Leading EDR
Credential Dumping

 

Discovery

green-check-icon

VSP
Software Discovery
System Network Configuration
System Network Connection
System Owner / User Discovery

 Orange-X-icon-1
Leading EDR
Software Discovery
System Network Configuration
System Network Connection
System Owner / User Discovery

 

Collection

green-check-icon

VSP
Automated Collection
Data from Local System

 Orange-X-icon-1
Leading EDR
Automated Collection
Data from Local System

 

Impact

green-check-icon

VSP
Inhibit System Recovery
Account Access Removal
Data Encrypted for Impact

 Orange-X-icon-1.yellow-line-icon.green-check-icon
Leading EDR
Inhibit System Recovery
Account Access Removal

Data Encrypted for Impact

 

VSP Works with Leading Incident Management Integration Platforms

Integrate precise security data to incident management workflows with API and Webhook integrations for faster time to detect, root cause analysis and triage.

VSP deploys across a broad set of workloads and applications with light-weight probes to continuously monitor the security posture and protect the organization in real time.

Take Charge of Your Workload Security

With Virsec, you can run the future, instead of letting it run you. Request a demo and experience the difference that application security built with innovation in mind can make for your organization. 
Virsec-Homepage-Experience-Icon@2x

Experience

Talk to an expert about your needs and get a live demo
Virsec-Homepage-Learn-Icon@2x

Learn

Explore resources written by and for industry-leading security analysts and experts