Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Defused is a software-as-a-service (SaaS) cyber deception platform designed to facilitate the deployment and oversight of deception and moving target defense capabilities across both on-premise and cloud-based networks. Our innovative attacker deception technology empowers security teams to establish highly accurate deception decoy sensors, allowing them to identify threats within their networks and detect cyber attackers without the complications associated with extensive setup processes. As a SaaS solution, our platform offers seamless management capabilities, even in highly distributed environments. Users can easily download and configure a virtual machine on their local or cloud network, which will automatically deploy our deception decoys throughout that network. These decoys are linked to a centralized management dashboard hosted in the cloud, which transmits alerts regarding any detected attacker activity back to the dashboard through a one-way connection. Additionally, our platform provides robust exploit detection aimed at identifying both emerging and unpatched vulnerabilities, ensuring a comprehensive approach to cybersecurity. With Defused, organizations can significantly enhance their defensive posture against potential threats.

Description

Mitigate unpredictable attacks that have the potential to cause significant harm by utilizing Moving Target Defense, which is effective across various attack vectors and types of threats—eliminating the need for indicators or waiting for patches and updates. Morphisec effectively reduces risk exposure and dramatically cuts technology expenses. By integrating Morphisec, you can transform your security approach and enhance your return on investment. The innovative moving target defense technology developed by Morphisec offers comprehensive protection against the most severe cyber threats. This solution ensures that attackers struggle to pinpoint the resources necessary to bypass your existing defenses due to its dynamic nature. Furthermore, this proactive cybersecurity measure safeguards your essential systems with a lightweight agent that is simple to deploy, requiring no updates to continuously protect vital infrastructure. Embracing this solution not only fortifies your security framework but also streamlines operational efficiency.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

No details available.

Integrations

No details available.

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Aves Netsec

Founded

2014

Country

Finland

Website

www.avesnetsec.com/product

Vendor Details

Company Name

Morphisec

Founded

2014

Country

United States

Website

www.morphisec.com

Product Features

Product Features

Cloud Workload Protection

Anomaly Detection
Asset Discovery
Cloud Gap Analysis
Cloud Registry
Data Loss Prevention (DLP)
Data Security
Governance
Logging & Reporting
Machine Learning
Security Audit
Workload Diversity

Endpoint Detection and Response (EDR)

Behavioral Analytics
Blacklisting/Whitelisting
Continuous Monitoring
Malware/Anomaly Detection
Prioritization
Remediation Management
Root Cause Analysis

Endpoint Protection

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

Alternatives

Fidelis Elevate Reviews

Fidelis Elevate

Fidelis Security

Alternatives

CrowdStrike Falcon Reviews

CrowdStrike Falcon

CrowdStrike
Trapster Reviews

Trapster

Ballpoint
Baits Reviews

Baits

MokN
Trend Vision One Reviews

Trend Vision One

Trend Micro
ShadowPlex Reviews

ShadowPlex

Acalvio Technologies