

Intezer Protect
Protect your cloud workloads against unauthorized code. Top-tier threat detection with no manual configuration or overhead for your team. Detect and terminate any unauthorized and malicious code. Detect and terminate in-memory threats.
Cost / License
- Freemium (Subscription)
- Proprietary
Platforms
- Online

Intezer Protect
Features
- Malware Analysis
Tags
- cyber-threats
- Security Utilities
Intezer Protect News & Activities
Recent News
Recent activities
Intezer Protect information
What is Intezer Protect?
Protect your cloud workloads against unauthorized code. Top-tier threat detection with no manual configuration or overhead for your team. Detect and terminate any unauthorized and malicious code. Detect and terminate in-memory threats, including exploitation of known and unknown vulnerabilities. Detect suspicious shell commands and Living off the Land (LotL) attacks. Monitor and log any new software running on your cloud servers. Visual dashboard showing high-level security status of all cloud servers. Contextual, prioritized alerts including origin of code and malware family. Covers the entire cloud native stack: VMs, containers, and container orchestration platforms. Designed to protect Linux systems (not a migration from a Windows Endpoint detection platform). Ultra-lightweight agent designed to work in modern production environments. Simple deployment tailored for cloud environments. Quick on boarding process protects workloads against breaches in less than 24 hours.
