RunSafe Security: Cyberhardening a fleet of targets against the swarm

RunSafe security logo - IntellyxAn Intellyx BrainCandy Brief

Watch any Hollywood or TV show portrayal of hackers, and you’d think they are insanely caffeinated geeks in a pit of servers, tirelessly decrypting data streams and applying algorithms to get root-level access to sensitive systems.

But in reality, they’re lazily spamming and scamming. Playing a numbers game using phishing and automated scanning to shake out known vulnerabilities, gullible employees and unintentionally unlocked doors.

RunSafe Security isn’t trying to replace the fences and gates of security, you have authorization and IDR tools for that. Nor are they dealing with virus removal and governing network flows. They are focused on immunizing the runtime systems themselves against attack.

You may not know this, but the majority of known compromises are caused by memory-level exploits: finding a certain pattern or sector of the active memory in an OS, whether it is on a physical server, VM or container image.

Whether inserted locally in the CI/CD pipeline or called as a service via API, RunSafe inserts a ‘memory scrambling’ routine into the compiled runtime code, so that vulnerabilities can never be found in the same memory location twice. 

Deployed software still performs exactly as expected in production with very little overhead since there are no agents nor ‘gating’ involved, but the ability for attackers to retrace their steps to an exploit found in one compromised instance will inevitably fail in the next.

That’s just not worth the trouble. Move along, script kiddies and bad actors.

 

©2020 Intellyx LLC. At the time of writing, RunSafe Security is not an Intellyx customer. Want to see more BrainCandy? Subscribe today. If you are a vendor seeking coverage from Intellyx, please contact us at PR@intellyx.com.

SHARE THIS:

Principal Analyst & CMO, Intellyx. Twitter: @bluefug