Runsafe Security Alkemist
0.00

Problems that solves

Unauthorized access to corporate IT systems and data

Risk or Leaks of confidential information

Risk of attacks by hackers

Risk of data loss or damage

Risk of lost access to data and IT systems

High costs

Values

Reduce Costs

Ensure Security and Business Continuity

Runsafe Security Alkemist

Cyberharden the software that powers vulnerable embedded systems and devices. Disrupt the traditional economics of cyberattacks and deny the routine tactics and techniques that attackers prefer.

Description

Alkemist uses remotely deployable software binary runtime application self-protection (RASP) and Moving Target Defense (MTD) methods to significantly reduce risk by precluding exploits from spreading across multiple devices and networks. Originally born out of a research project for the Advanced Research Projects Agency of the Department of Defense, Alkemist is the only automated cyber hardening tool to protect open-source, in-house developed code, or third-party binaries while leaving each system functionally identical, but logically unique. Alkemist actively prevents malware from being executed through common techniques including:
  • Memory corruption attacks (buffer, stack, and heap)
  • Return/jump oriented programming (ROP/JOP) attacks
  • Compromised hardware and software supply chain attacks
  • Scaling of zero-day attacks
Features: Protect M2M Communications Eliminate the sensor or system impersonation used to steal critical information. Protect Mission Readiness Prevent attacks on embedded systems and devices in ships, planes, weapons, and data centers on base from propagating and causing damage. Ensure Reliability/Availability Shrink attack surfaces to minimize vulnerabilities with a high consequence of failure. Harden Vehicle Components Reduce opportunities for attackers to inject malware on modules such as brake systems, ECUs, CAN bus, telematics, and infotainment. Maintain Data Center Uptime Ensure that operations supporting data transactions meet the needs of your customers. Reduce Healthcare Risk Safeguard monitoring devices and patient data.

User features

Roles of Interested Employees

Chief Executive Officer

Chief Information Officer

Chief IT Security Officer

IT Security and Risk Management

Organizational Features

IT Security Department in company