I rate Morphisec Breach Prevention Platform nine out of 10. It has some unique features compared to competing products that offer in-memory protection. At the same time, Morphisec is relatively new to the market space. CrowdStrike offers incident monitoring services, whereas Morphisec is only starting to do that. If you need a 24/7 managed detection response, other players have it, but Morphisec is beginning to do it.
You have to keep a watch on all the alerts you are getting. There is no major thing that needs to be monitored or taken care of during the deployment. You can simply go ahead with it and then forget worrying. I would recommend it for a small organization. The spending on security is less in smaller organizations, and they often don't go for an alert mechanism or a SIEM tool. A solution like Morphisec is recommended for having an analytical view of what is happening inside the server and what kind of infection is there. It has been working pretty well for us. I would rate it a nine out of ten.
Manager Network & Information Security at a financial services firm with 51-200 employees
Real User
2022-10-09T21:15:00Z
Oct 9, 2022
So far, we haven't been subject to attacks or incidents. But from what I have seen globally, Morphisec has prevented many attacks. I have registered for Morphisec's articles and they have articles on what they're blocking currently. It is a useful tool as an InfoSec and cyber security platform for all IT members, giving them more in-depth knowledge about every alert, including the exact process that generated the alert.
IT Security and Support at a healthcare company with 1,001-5,000 employees
Real User
2022-03-16T13:29:00Z
Mar 16, 2022
My advice is to get to know the individuals at Morphisec. Lay out your infrastructure and where you need to put it and let them help you do that. Also, be open to new ways of tackling security problems.
This product provides us with full visibility into security events with Microsoft Defender and Morphisec in a single dashboard, although this is not a focal point for us because we do not use Defender. We use Trend Micro for protection. I would rate this solution a nine out of ten.
CISO at a logistics company with 1,001-5,000 employees
Real User
2021-10-01T07:00:00Z
Oct 1, 2021
I am quite happy with the way they perform, providing us with information, new possibilities, and new features. My advice, "Just do it," if you are looking at implementing this solution. Morphisec makes use of deterministic attack prevention that doesn’t require investigation of security alerts. If you want, you can deep dive into an attack, but you don't need to. In the future, we may have more security personnel and want to deep dive into an attack to see where it happened, what happened, and learn from it. Then, maybe we can have some other controls in place in other areas of our IP environments. Because of the deep dive and benefit analysis, it is good. However, we don't do that now. The solution has added some workload because there previously wasn't a security team in place. Now, with the focus on security getting higher, the board of directors wanted to have some more security in place. One of the first tools that we bought was Morphisec, besides endpoint protection, antivirus, and firewalls. Our dedicated security tooling was Morphisec. It added focus in the company on security. Also, some people are busy with security now, besides their normal jobs. If we have more machines, then we will definitely increase usage. Also, Linux is now out of scope because they don't have it in their suite yet. If this is added into their suite, then we could have Linux protection as well. Biggest lesson learnt: It is quite difficult to have an organization with a lot of complexity in their networking as well as differences in the way the network is architectured. It is always more difficult than you think. I would rate this solution as nine out of 10.
Don't overthink it. Just do it. Follow the directions of Morphisec and go for it, but make sure you understand what your application stack is before you go full bore, so you don't create false positives. However, they are easy to work with in those terms. The reality is nobody ever gets to a single pane of glass or a single dashboard. Those claims are made by vendors, even Morphisec will make it. The problem is you have so many layers in your security stack that you will never get to a single pane of glass. So, I never have that as a requirement because I know it is not attainable. We do not have Microsoft Defender in place, but so far it is providing visibility for what it is installed on. While I have known of the company since 2016, they are still a startup. They are still equity-backed. I don't know where they are going to end up, but right now I am confident that they have good backing and financial resources. They got a new round of funding just after the first of the year. That is always a good sign. Biggest lesson is the amount of discipline required in our company to stay current. Morphisec highlights breakdowns that we have in process and procedure, which is a good thing, but it's highlighted to us that we need to be a little bit more disciplined. I would rate Morphisec as nine out of 10.
Network Administrator at a educational organization with 201-500 employees
Real User
2021-07-26T23:48:00Z
Jul 26, 2021
My advice would be to make sure that if there are a lot of computers, especially if they're remotely distributed, make sure they have some sort of solution to easily push out and deploy it to multiple clients. That's probably the biggest hurdle that I think a lot of people would have. And we had two solutions already in place for us in the past that worked and that were compatible. The nice thing is that they were able to provide a Microsoft MSI Installer so that you can even have it so that it pre deploys it while you're imaging your computers if you're using Microsoft for imaging. It's the same thing if you're using Intune through Microsoft. We've always been looking for something that would help to protect more against ransomware in our case. And this was it. This is the best solution that we found that worked for us. I would rate it a ten out of ten. My only complaints are the dashboard and that's not even terrible. It still works. You just have to be a little patient.
Director, DevOps at a tech services company with 51-200 employees
MSP
2021-07-22T13:41:00Z
Jul 22, 2021
My advice would be to really consider the reality. It's not a question of if you're going to get attacked by ransomware, it's a question of when. And while this seems like something that would be easy to kick down the road, in terms of evaluating the overall battlefield if you will, a ransomware attack will take down your organization. There's no doubt about it. I would advise you to realize that with that inevitability and how much of your environment it can takedown or render useless. This would probably be one of the higher, first choices, and first endeavors you should make as you go into your source of security portfolio. The biggest takeaway from this that I've had is, never underestimate would-be attackers. You have something on the internet, they're going to go for it. The other lesson I've learned is that sometimes users of computers do weird things, or do things differently than others would normally. That leaves the door open for would-be attackers of having tools like this in place. It will help you avoid headaches down the road. I would rate Morphisec a nine out of ten.
Director, Technical Services and Information Security at SECURA Insurance
Real User
2021-06-29T17:15:00Z
Jun 29, 2021
Morphisec hasn't added to my team's workload. It hasn't reduced it, but it hasn't added to it. I didn't buy it to save us money. I bought it to add another level of control at the endpoint beyond antivirus. So it's really adding another layer of defense. My advice would be to understand how Morphisec works from the Bad Actor's perspective, on how a Bad Actor or malware can compromise Windows or Linux. Morphisec gets to the root of those compromises. Rather than trying to detect the compromise, a design in the operating system issues and defeating those there or rather than trying to respond to changes in malware, they're defeating it right at the exploit level. I'm part of Morphisec's sales team half the time when I'm trying to educate other IT leaders, my peers, or other CISOs on how it's actually working because it takes a little while to understand it. So my advice would be to really try to ask questions about how the architecture works. Because it doesn't really work like another AV. It works much differently than other endpoint protectors. I would rate Morphisec a nine out of ten.
Make sure you implement it on all machines, workstations, and servers. Don't buy it and miss some machines. Morphisec says they haven't been hacked. From the instances that I have seen when doing research, I find that to be true. Time will tell, but so far it has been working for us. We will be implementing the Morphisec Guard probably next month. We are just rolling out Microsoft Defender right now. We are evaluating it now. I think we have also started replacing our former antivirus. Windows Defender and Morphisec go hand in hand, at least from an antivirus standpoint. Morphisec was built to work with Defender, and Defender is a pretty good product. So, that is what we will be using moving forward. From an antivirus standpoint, we just switched our antivirus to Defender within the last month. Between Defender and Morphisec, we don't really have another antivirus need after that. I would rate this solution as a seven or eight out of 10.
Sr. Network Engineer at Wilson County Schools - NC
Real User
2021-06-01T17:10:00Z
Jun 1, 2021
It's been a good experience. Morphisec has been helpful and we haven't had any outbreaks since running it. The install was easy. Updates have been pretty easy. I would rate Morphisec a ten out of ten.
Morphisec's cybersecurity platform is centered around its Moving Target Defense technology. This innovative approach is designed to prevent attacks by making the system environment dynamically unpredictable to attackers, thereby neutralizing zero-day threats, evasive malware, and in-memory exploits without requiring prior knowledge of attack patterns. Unlike traditional security systems that rely on detection and response strategies, Morphisec operates on the principle of attack prevention,...
I rate Morphisec Breach Prevention Platform nine out of 10. It has some unique features compared to competing products that offer in-memory protection. At the same time, Morphisec is relatively new to the market space. CrowdStrike offers incident monitoring services, whereas Morphisec is only starting to do that. If you need a 24/7 managed detection response, other players have it, but Morphisec is beginning to do it.
You have to keep a watch on all the alerts you are getting. There is no major thing that needs to be monitored or taken care of during the deployment. You can simply go ahead with it and then forget worrying. I would recommend it for a small organization. The spending on security is less in smaller organizations, and they often don't go for an alert mechanism or a SIEM tool. A solution like Morphisec is recommended for having an analytical view of what is happening inside the server and what kind of infection is there. It has been working pretty well for us. I would rate it a nine out of ten.
So far, we haven't been subject to attacks or incidents. But from what I have seen globally, Morphisec has prevented many attacks. I have registered for Morphisec's articles and they have articles on what they're blocking currently. It is a useful tool as an InfoSec and cyber security platform for all IT members, giving them more in-depth knowledge about every alert, including the exact process that generated the alert.
My advice is to get to know the individuals at Morphisec. Lay out your infrastructure and where you need to put it and let them help you do that. Also, be open to new ways of tackling security problems.
This product provides us with full visibility into security events with Microsoft Defender and Morphisec in a single dashboard, although this is not a focal point for us because we do not use Defender. We use Trend Micro for protection. I would rate this solution a nine out of ten.
I am quite happy with the way they perform, providing us with information, new possibilities, and new features. My advice, "Just do it," if you are looking at implementing this solution. Morphisec makes use of deterministic attack prevention that doesn’t require investigation of security alerts. If you want, you can deep dive into an attack, but you don't need to. In the future, we may have more security personnel and want to deep dive into an attack to see where it happened, what happened, and learn from it. Then, maybe we can have some other controls in place in other areas of our IP environments. Because of the deep dive and benefit analysis, it is good. However, we don't do that now. The solution has added some workload because there previously wasn't a security team in place. Now, with the focus on security getting higher, the board of directors wanted to have some more security in place. One of the first tools that we bought was Morphisec, besides endpoint protection, antivirus, and firewalls. Our dedicated security tooling was Morphisec. It added focus in the company on security. Also, some people are busy with security now, besides their normal jobs. If we have more machines, then we will definitely increase usage. Also, Linux is now out of scope because they don't have it in their suite yet. If this is added into their suite, then we could have Linux protection as well. Biggest lesson learnt: It is quite difficult to have an organization with a lot of complexity in their networking as well as differences in the way the network is architectured. It is always more difficult than you think. I would rate this solution as nine out of 10.
Don't overthink it. Just do it. Follow the directions of Morphisec and go for it, but make sure you understand what your application stack is before you go full bore, so you don't create false positives. However, they are easy to work with in those terms. The reality is nobody ever gets to a single pane of glass or a single dashboard. Those claims are made by vendors, even Morphisec will make it. The problem is you have so many layers in your security stack that you will never get to a single pane of glass. So, I never have that as a requirement because I know it is not attainable. We do not have Microsoft Defender in place, but so far it is providing visibility for what it is installed on. While I have known of the company since 2016, they are still a startup. They are still equity-backed. I don't know where they are going to end up, but right now I am confident that they have good backing and financial resources. They got a new round of funding just after the first of the year. That is always a good sign. Biggest lesson is the amount of discipline required in our company to stay current. Morphisec highlights breakdowns that we have in process and procedure, which is a good thing, but it's highlighted to us that we need to be a little bit more disciplined. I would rate Morphisec as nine out of 10.
My advice would be to make sure that if there are a lot of computers, especially if they're remotely distributed, make sure they have some sort of solution to easily push out and deploy it to multiple clients. That's probably the biggest hurdle that I think a lot of people would have. And we had two solutions already in place for us in the past that worked and that were compatible. The nice thing is that they were able to provide a Microsoft MSI Installer so that you can even have it so that it pre deploys it while you're imaging your computers if you're using Microsoft for imaging. It's the same thing if you're using Intune through Microsoft. We've always been looking for something that would help to protect more against ransomware in our case. And this was it. This is the best solution that we found that worked for us. I would rate it a ten out of ten. My only complaints are the dashboard and that's not even terrible. It still works. You just have to be a little patient.
My advice would be to really consider the reality. It's not a question of if you're going to get attacked by ransomware, it's a question of when. And while this seems like something that would be easy to kick down the road, in terms of evaluating the overall battlefield if you will, a ransomware attack will take down your organization. There's no doubt about it. I would advise you to realize that with that inevitability and how much of your environment it can takedown or render useless. This would probably be one of the higher, first choices, and first endeavors you should make as you go into your source of security portfolio. The biggest takeaway from this that I've had is, never underestimate would-be attackers. You have something on the internet, they're going to go for it. The other lesson I've learned is that sometimes users of computers do weird things, or do things differently than others would normally. That leaves the door open for would-be attackers of having tools like this in place. It will help you avoid headaches down the road. I would rate Morphisec a nine out of ten.
Morphisec hasn't added to my team's workload. It hasn't reduced it, but it hasn't added to it. I didn't buy it to save us money. I bought it to add another level of control at the endpoint beyond antivirus. So it's really adding another layer of defense. My advice would be to understand how Morphisec works from the Bad Actor's perspective, on how a Bad Actor or malware can compromise Windows or Linux. Morphisec gets to the root of those compromises. Rather than trying to detect the compromise, a design in the operating system issues and defeating those there or rather than trying to respond to changes in malware, they're defeating it right at the exploit level. I'm part of Morphisec's sales team half the time when I'm trying to educate other IT leaders, my peers, or other CISOs on how it's actually working because it takes a little while to understand it. So my advice would be to really try to ask questions about how the architecture works. Because it doesn't really work like another AV. It works much differently than other endpoint protectors. I would rate Morphisec a nine out of ten.
Make sure you implement it on all machines, workstations, and servers. Don't buy it and miss some machines. Morphisec says they haven't been hacked. From the instances that I have seen when doing research, I find that to be true. Time will tell, but so far it has been working for us. We will be implementing the Morphisec Guard probably next month. We are just rolling out Microsoft Defender right now. We are evaluating it now. I think we have also started replacing our former antivirus. Windows Defender and Morphisec go hand in hand, at least from an antivirus standpoint. Morphisec was built to work with Defender, and Defender is a pretty good product. So, that is what we will be using moving forward. From an antivirus standpoint, we just switched our antivirus to Defender within the last month. Between Defender and Morphisec, we don't really have another antivirus need after that. I would rate this solution as a seven or eight out of 10.
It's been a good experience. Morphisec has been helpful and we haven't had any outbreaks since running it. The install was easy. Updates have been pretty easy. I would rate Morphisec a ten out of ten.