Capturing zero days with PERFectly placed hardware traps
Hunting Beyond the Hype: Why IOCs are Not Enough!

Latest Resources

SANS THIR 2017

Endgame is a gold sponsor of this year's conference at the New Orleans Downtown Marriott from April 18-19, 2017. Visit our booth to meet our experts.

LEARN MORE

Women in Cybersecurity Conference 2017

Endgame will be running a workshop on reverse engineering and will have a table in the career fair expo during this conference.

LEARN MORE

2017 Cyberthreat Defense Report

Download this comprehensive report to understand your peers’ security postures, top concerns and risks, and planned 2017 investments.

Learn More

Webinar Invite with 451 Research: Zero Breach Tolerance

Join our webinar with 451 Research titled "Zero Breach Tolerance: Earliest protection across the attack lifecycle."

LEARN MORE

Resources by Type

On-Demand Webinar: Pre-Exploit Detection and Mitigation Techniques

Current defenses target obsolete offensive techniques. This is especially true with exploit mitigations, and Return-Oriented Programming (ROP) in particular. Anti-exploit solutions need to disrupt early in the stages of exploitation to maintain an advantage. Endgame’s Hardware Assisted Control Flow Integrity (HA-CFI) stops adversaries before any code is executed.

This webinar will cover:

  • The challenges with exploit detection
  • Exploit prevention framework and mitigation techniques 
  • Endgame’s approach to pre-exploit detection

Watch Now