Attack prevention

It helps to reduce the attack surface of specific applications

Applications run with the minimum possible set of privileges for a given purpose.

  • Least privilege principle.

Any attack that compromises an application to behave differently from the expected has a high probability of being detected and blocked.

  • e.g. execution of other binary files.

  • Ideal for preventing zero-day attacks.

The application’s hidden behaviours may be detected and blocked when triggered.

  • e.g. Trojan Horses.

Last updated