There were 1,495 press releases posted in the last 24 hours and 440,959 in the last 365 days.

Deceptive Bytes' new Active Endpoint Deception solution for Linux is now available

Deceptive Bytes Multitenancy Devices page, allowing operators to view their devices status and statistics

Deceptive Bytes releases its first Linux version of its Active Endpoint Deception solution for the public

The Deceptive Bytes platform gives organizations a single, user-friendly and lightweight solution to ensure their security in today’s rapidly changing threat landscape.”
— Avi Lamay

HOLON, HAMERKAZ, ISRAEL, April 19, 2023/EINPresswire.com/ -- Deceptive Bytes is thrilled to announce the release of the first Linux version of its Active Endpoint Deception solution with support for enterprise server distributions: Ubuntu, Debian, RHEL, and SLES.
This new release will ensure that more assets in our customers' environments will be protected against advanced and stealthy threats that are designed to bypass or circumvent traditional endpoint security solutions (including on Linux servers).
With the new Linux agent, Deceptive Bytes is also releasing a new version of the management server which will support managing and deploying to multiple operating systems seamlessly throughout the platform.


“The Deceptive Bytes platform gives organizations a single, user-friendly and lightweight solution to ensure their security in today’s rapidly changing threat landscape.” says Avi Lamay, CTO & Co-Founder of Deceptive Bytes
“The new Linux version will give our customers & partners a new proactive level of security and experience with the Deceptive Bytes platform’s comprehensive offerings, allowing them to quickly prevent, identify and react to threats targeting Linux systems as well.”


About Deceptive Bytes
Deceptive Bytes, a leader in endpoint deception technology, provides its Active Endpoint Deception platform to enterprises & MSSPs which enables them real-time prevention of unknown and sophisticated threats. The solution dynamically responds to threats as they evolve, based on the current detected stage of compromise and changes their outcome, giving defenders the upper-hand in protecting their assets and data.
Recognized as a Gartner Cool Vendor in Security Operations and Threat Intelligence

Hen Lamay
Deceptive Bytes
+1 844-806-9069
press@deceptivebytes.com
Visit us on social media:
Twitter
LinkedIn
YouTube

Legal Disclaimer:

EIN Presswire provides this news content "as is" without warranty of any kind. We do not accept any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information contained in this article. If you have any complaints or copyright issues related to this article, kindly contact the author above.