InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

SolarWinds Attack End-to-End Demo

Presented by

Virsec

About this talk

This demonstration shows how the culprits infiltrated and deposited a backdoor into the well-protected SolarWinds software infrastructure, which then made its way into the systems of tens of thousands of users in the SolarWinds supply chain. This type of attack, Remote Code Execution (RCE), is devastating because it executes in runtime, a notorious blind spot for most organizations. Current security solutions rely on knowledge of past malware to form signatures or behavioral profiles of what might happen next. End point protection, perimeter and threat hunting tools won’t identify unique malware that already exists in your system. Effective supply chain protection requires new tactics. Watch as the Virsec security solution immediately identifies and stops an evasive Remote Code Execution attack in an end-to-end recreation of the SolarWinds attack.
OTTOGUARD.AI

OTTOGUARD.AI

4484 subscribers4 talks
Exposure management done right
OTTOGUARD.AI mission is autonomous security. It eliminates the need for constant patch management and solving for when patches are not readily available. Unlike traditional vulnerability remediation, OTTOGUARD.AI uses patented zero-trust technology to instantly neutralize both known and zero-day threats at runtime, and without patching. This shift to patchless protection delivers true zero mean time to remediate (MTTR), autonomously stopping threats the moment they emerge. With comprehensive workload vulnerability insights and autonomous application control, OTTOGUARD.AI instantly locks down your organization’s software supply chain at runtime, neutralizing threats in milliseconds.

Related topics