Products

What’s New in Digital Immunity Protect v2.0

Learn More!

Digital Immunity Server Protect

Digital Immunity Protect

  • Protect High Value Critical Digital Assets
  • Enterprise Applications
  • Database Servers
  • Phishing Attack Prevention
  • Continuous End User Productivity Assurance
  • Approved Business Application Continuity

The Digital Immunity engine has three primary components:

Protection for both commercial off the shelf software and custom developed code.
  • Analyzes software components of the system prior to first use
  • Extracts the digital DNA
  • Publishes each component’s map to the Map Manager for protection

Leverages a lightweight sensor on the endpoint for continuous enforcement of software integrity.
  • Uses the DNA maps for detection of foreign, unexpected code.
  • Terminates the offending process when an attack is discovered, per policy invoked.
  • Captures forensic details and sends desired alerts to the security administrator

Uses a database on a virtual system to define good software mappings for applications.
  • DNA Sensor – maps the endpoint it resides on to validate all process execution at the local level.
  • Operates even if network connectivity to the manager is not available
  • Digital Immunity DNA Map Manager/Control Center is available as a virtual appliance

Watch Below to Learn More!

John Murgo Video

Want to learn more about our products?
Download our Datasheet now!

Features

In Memory Verification

Verifies the integrity of executing code throughout the runtime lifecycle

  • Viruses and Malware are only effective when they can run. By monitoring every app and service in memory we are able to prevent them from infecting a network

Prevention

Prevents any attempt to execute malicious code before it starts

  • Notify and/or Terminate on any foreign or malicious attacks
  • Capture deep forensic information about attack and origin

Detection

Detects attempted execution of foreign and injected software

  • Provides immediate Endpoint vaccination, including already infected Endpoints
  • Prevents future infections with continuous runtime Endpoint surveillance
  • Captures malicious instruction sequences as forensic information

Ease of Deployment

  • Automated deployment in hours
  • No special skills required
  • Low total cost of ownership

We’re not application whitelisting, we’re better.

When you read about Digital Immunity’s, product you are going to be tempted to label us as an application whitelisting product.

Application whitelisting does a better job of securing your environment than blacklisting approaches but:

  • They can’t prevent attacks: including memory injection, interpreted code and shell code (java, macros and kernel level attacks)
  • They are time consuming
  • Disruptive to your operation
  • They do not provide run time protection, nor do they deliver detailed forensics artifacts

Digital Immunity provides all the benefits of application whitelisting and more, without the administrative overhead

We provide continuous visibility into operating systems and applications running in your dynamic environment across your enterprise, so you can take proactive measures to protect your business.

We’re not application whitelisting, we’re better.

Read the Case Study
Nicole Woods – Insite Data Services
“Before deploying Digital Immunity I thought it would take weeks to map all 22,000 applications. I had visions of late nights, weekends and a lot of disruption. But I was wrong. It took only a matter of hours over one weekend for everything to me mapped and ready for protection. Better yet, the hours each week I was spending patching our systems against security leaks has been eliminated. I’ve gotten so much time back to focus on business imperatives.”

Benefits

The Application is the New Perimeter

The enterprise network has become increasingly complex as the perimeter has expanded beyond the desktop and servers, with applications and users everywhere. Mobile and cloud based applications continue to drive demand for anytime, anywhere access. The application is the new perimeter, and ensuring computational integrity is security’s next great achievement.

Unique Deterministic Detection

A Digital DNA Map of each function within an application is created, generated from a known, trusted source. Published to the Map Manager and provisioned to each Endpoint, Digital Immunity works in real-time, continually monitoring that the applications haven’t been modified in memory. Deep granular data retention on kernel-level activity meets compliance standards and provides actionable, real-time defense. A DNA Sensor kernel driver is installed on each Endpoint, delivering a lightweight approach that does not rely on complex, resource intensive, constant data collection. Our unique deterministic detection and prevention method does not involve signatures, hashes, behavioral analytics, predictive analysis, big data or machine learning.

Bioinformatics Methodology Conquers Current Industry Limitations

Protected by three patent family filings, Digital Immunity’s bioinformatics methodology is called Digital DNA Mapping, which validates the DNA executable code at the individual function level. No changes or additions to the source or executable code are required, and this perfectly secure technique avoids the high computational cost of repetitive run-time re-computation of cryptographic signatures or hashes. This methodology enables “adaptive immunity” for foreign code. Through high performance and strong forensics, Digital Immunity maintains an analog of immunological memory on each Endpoint that identifies running software as trusted or untrusted, without resource-intensive behavioral or cryptographic techniques, hash codes or signatures.

Easy to Deploy & Administer

Traditionally, A/V security type products are difficult to deploy and maintain. We’ve taken customer feedback and developed sophisticated deployment and management techniques which provide desired proactive alerts, giving you the ability to get back your time. No false positives or negatives eliminate alert fatigue.

Complete Visibility

You can’t prevent what you don’t know is happening. Digital Immunity surfaces complete visibility into the applications being used by your employees across all devices.

Transform Your Team into Security Operators

Most approaches to security keep your team in a constant scramble, but not Digital Immunity. We allow you to create risk-based profiles and then act upon alerts within your business context. When the system finds a threat you can instantly switch from alert to terminate mode on the fly.

Want to give Digital Immunity a try? Click here for more information and to request a software demo.