Alkemist uses remotely deployable software binary runtime application self-protection (RASP) methods to significantly reduce risk by precluding exploits from spreading across multiple devices and networks. Originally born out of a research project for the Advanced Research Projects Agency of the Department of Defense, Alkemist is the only self-service cyberhardening tool to protect binaries while leaving each system functionally identical, but logically unique.
Alkemist actively prevents malware from being executed through common techniques including:
- Memory corruption attacks (buffer, stack, and heap)
- Return/jump oriented programming (ROP/JOP) attacks
- Compromised hardware and software supply chain attacks
- Scaling of attacks
Most of today’s cybersecurity tools cannot keep up with evolving threats and multiplying vulnerabilities. With Alkemist, organizations can reduce vulnerabilities and make them virtually impossible to exploit.
Eliminate Attack Vectors
Make all systems functionally identical but logically unique.
Decrease zero-day threats via binary randomization.
Deny Malware the Uniformity to Propagate
Preclude exploits from spreading across devices.
While many embedded system, device, and ICS security solutions focus on identifying breaches with firewalls, anti-virus software, or intrusion protection, RunSafe Security assumes that hackers will eventually break in. Therefore, rather than reacting to compromised vulnerabilities following an exploit, Alkemist thwarts attacks.
Protect M2M Communications
Eliminate sensor or system impersonation used to steal critical information.
Protect Mission Readiness
Prevent attacks on embedded systems and devices in ships, planes, weapons, and data centers on base from propagating and causing damage.
Shrink attack surfaces to minimize vulnerabilities with a high consequence of failure.
Harden Vehicle Components
Reduce opportunities for attackers to inject malware on modules such as brake systems, ECUs, CAN bus, telematics, and infotainment.
Maintain Data Center Uptime
Ensure that operations supporting data transactions meet the needs of your customers.
Alkemist can be remotely deployed and requires
- No new software, services, or hardware
- No access to source code
- No dependence on compiler or operating system
- No alerts that consume scarce resources to monitor
Alkemist enables protection of software, devices, and systems in minutes – and can be accessed through our web client or RestAPI.