Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Cadence Adopts K2 Cyber Security Platform to Secure Business-Critical Applications Against Zero-Day Attacks

K2 Platform Catches Attacks Exploiting Newest Vulnerabilities in Adobe Experience Manager

K2 Cyber Security, Inc. announced that Cadence Design Systems, Inc., a leading provider of software, hardware and IP to electronics systems and semiconductor companies, has adopted the K2 Security Platform to protect its critical web applications against cyber-attacks attempting to exploit vulnerabilities. The K2 Security Platform enables Cadence to detect attacks and take corrective actions immediately.

“The K2 Security Platform’s runtime protection of our critical applications has further strengthened our security infrastructure,” said Sreeni Kancharla, vice president and chief information security officer at Cadence Design Systems. “We were very impressed by K2’s real-time detection of attacks, which can potentially get missed by WAF and EDR solutions. The K2 Security Platform does not generate false positives, thereby reducing the burden on our security personnel, and it has greatly enhanced our defense-in-depth strategy for protecting our applications from attacks.”

Read More: AI Technology RADAR: Shaking the IT Foundations with AIOps- Part 1

Related Posts
1 of 22,122

K2 Security Platform provides comprehensive runtime protection for container and web application workloads against sophisticated attacks including SQL injection, remote code execution, cross site scripting, server-side request forgery and fileless attacks such as return oriented programming. Unlike signature and behavior-based approaches that require prior knowledge of the exploited vulnerability or attack methodology, K2’s patent-pending Optimized Control Flow (OCFI) technology creates a unique map or DNA for each application and validates application execution against that map to detect attacks, offering the industry’s first, real-time zero-day attack detection without false positives regardless of an application’s patch status. K2 platform provides real-time forensics on the attack incident, which includes the file name and line number of the vulnerable application targeted by the attack.

Read More: Talkwalker Launches AI-Powered Solution To Better Analyze Customer Conversation Data

“Current security solutions are ineffective in protecting against sophisticated attacks on business applications because they rely on signatures or behavior,” said Pravin Madhani, chief executive officer and co-founder of K2 Cyber Security. “K2’s unique approach of creating a DNA map of the application execution results in real-time attack detection, elimination of false positives and delivery of the lowest latency security solution in the market today. By working with Cadence, we’ve watched the company achieve success using K2 as the last line of defense to protect its critical applications against attacks.”

Read More: Reputation In The Online World: How Brands Can Cut Through The Endless Choices Of The Customer Journey

Leave A Reply

Your email address will not be published.