Intezer

Runtime protection for your cloud workloads

Proven Linux threat detection with no manual policies or overhead for your team

Intezer home page background

Protect All Compute Resources Under One Roof

Including VMs, containers, functions, and anything that runs code, while guarding against unauthorized or malicious code in runtime.

Without Runtime Security, Attacks Go Undetected

Fixing vulnerabilities to reduce the attack surface is vital but so is the need for detecting attacks when they occur in runtime.

Runtime protection is not limited to a single attack vector, functioning as a last line of defense even after an attacker has exploited a vulnerability or misconfiguration.

Full Visibility and Control Over Your Environment

Intezer’s lightweight sensor inspects every application, process or code running across your environment in memory, verifying you’re running 100% trusted code round-the-clock.

Born in the Cloud

  • Holistic security for all types of compute resources: VMs, containers, Kubernetes, CaaS and FaaS
  • Integrated threat intelligence specializing in Linux threats
  • Integrate with your favorite DevOps tools including Chef, Puppet, Ansible and more

Reduce Attack Surface

  • Identify and disable unwanted or risky applications
  • Identify vulnerabilities in runtime
  • Identify misconfigurations
  • Align with security benchmarks (CIS, NIST)

Visibility

  • Monitor and log any running application or code
  • Visual dashboard showing high-level security status of all compute resources

Detect

  • Detect malicious code and malware in runtime
  • Detect unrecognized or unauthorized code
  • Detect exploitation of known and unknown vulnerabilities
  • Detect suspicious shell commands and Living off the Land (LotL) attacks

Respond

  • Quickly terminate any unauthorized code without harming production
  • Contextual alerts including origin of code and malware family
  • Root Cause Analysis for incidents; identify the point of compromise in order to quickly fix the vulnerability
  • Seamlessly integrate with tools such as SIEM, SOAR and even Slack

More than

500 Enterprises

and public sector organizations leverage Intezer’s capabilities to defend against the latest threats.
Nir RothenbergCISO, Rapyd

We use Intezer Protect to defend our high-risk assets. Intezer’s unique approach, which is not behavioral or signature based, found threats much faster than other solutions we tested. Intezer’s lightweight agent is another advantage as we value performance in our production environment.

Our Partners

Specializing in Linux Threat Detection

Attackers are shifting their focus to target cloud and Linux-based infrastructure. Intezer is leading the charge in researching the latest Linux threats.

Why Intezer?

Not another anomaly detection solution

We analyze the code!

Proven Linux threat detection

No manual rules or policies

No impact on production performance

Our products

Intezer Protect

Cloud Workload Protection Platform

Defend your cloud workloads in runtime against unauthorized and malicious code.
Cloud workload protection platform
Intezer Analyze

Malware Analysis
Platform

Get clear classification for your threats in seconds.
Malware analysis platform
© Intezer.com 2020 All rights reserved