Deceptive Bytes announces securing a patent application for its malware prevention technology

13/09/2021

Holon, Israel – 13/09/2021 – Deceptive Bytes, a leader in endpoint deception technology, announces it has secured a new patent from USPTO (the U.S. Patent & Trademark Office). The patent titled “METHODS AND SYSTEMS FOR END-POINT MALWARE PREVENTION TO REFRAIN MALWARE COMPONENTS FROM BEING EXECUTED” (USPTO Patent No. 16/315,866) covers Deceptive Bytes’ unique technology, which helps prevent malware from executing its malicious code in various types of environments. The patent is another proof of Deceptive Bytes’ innovative technology in the realm of cyber security.

“The patent is a true testament for our customers and partners of our unique approach to malware prevention. Our endpoint deception technology, which is built into our Active Endpoint Deception platform, was already recognized for its distinction in the industry by Gartner, CB Insights and SC Magazine, among others, and the patent reaffirms our ground breaking approach to cyber attacks as our platform continues to help organizations around the world protect against sophisticated, never seen before malware attacks.”

Sagi Lamay, Co-Founder & CEO of Deceptive Bytes

 

About

Deceptive Bytes, a leader in endpoint deception technology, provides its Active Endpoint Deception platform to enterprises & MSSPs which enables them real-time prevention of unknown and sophisticated threats. The solution dynamically responds to threats as they evolve, based on the current detected stage of compromise and changes their outcome, giving defenders the upper-hand in protecting their assets and data.

Contact us

Tel: +1-844-806-9069

Email: in**@************es.com

Address: Azrieli Holon Business Center, Harokmim St 26, Holon, Israel

Contact Us

Don’t Miss a Thing

Sign up today and we’ll send an email when new posts come out.

We collect and use this information in accordance with our privacy policy.

Related content

Deceptive Bytes mentioned in Gartner’s research on Top Use Cases in Preemptive Cyber Defense

Avi Lamay

18/11/2024

Receive high-fidelity alerts as threats are forced to uncover their presence when checking the environment prior to...

Case study – preventing Malgent trojan horse

12/09/2024

Receive high-fidelity alerts as threats are forced to uncover their presence when checking the environment prior to...

The Role of Large Language Models in Enhancing Ransomware and Malware Threats

22/08/2024

Receive high-fidelity alerts as threats are forced to uncover their presence when checking the environment prior to...

Skip to content