Many advanced cyber attacks rely on subverting and controlling an application in memory while it is running. These attacks can be extremely difficult for conventional cybersecurity techniques to detect and defend.
PolyX continuously changes an applications memory layout--while it is running. Code is dynamically moved and modified, mitigating even the most sophisticated attacks.
PolyX runs as an agent for Linux applications. As part of layered cyber defense strategy, PolyX can amplify the protection for Internet facing services, honeypots, and other services exposed to hostile actors.
We have not yet collected reviews for PolyX. Share your experience with PeerSpot's community.
Provide a review