Mitigate Baron SameEdit (CVE-2021-3156) vulnerability

Celebrating bringing Polyverse’s ground-breaking Linux security to SUSE customers

By Ed Trainor

Having recently come from SUSE and started at Polyverse as VP of Strategic Partnerships, I’m personally excited to see the launch of Polymorphing for SUSE Linux Enterprise Server at #SUSECONDigital 2020.

Many of SUSE’s customers run highly mission critical applications so ensuring that their systems are secure and highly available is of upmost importance to them. Typically, these customers run Linux across their organizations; as the OS embedded in the cars they’re selling, in the datacenter supporting their corporate database, or as the underlying OS for their ERP application (SUSE is well known for being the preferred OS of SAP customers). Many also have solutions and applications running in the cloud on Azure or AWS.

These organizations have no tolerance for downtime and security breaches can be reputation damaging and financially crippling. One CISO we spoke to recently told us that 15 minutes of downtime costs them $3 million.

Keeping all these systems up to date and secure is a challenge. The Ponemon Institute discovered the average time to apply, test and deploy a patch is 97 Days. Patching critical systems often requires downtime, creating a stark choice between availability and security. The other problem with patching is that it doesn’t stop the exploitation of unknown vulnerabilities. A study by RAND found that vulnerabilities lived on average for 2,521 days before being discovered and a patch being released. Traditional front-line defenses are simply no longer adequate and estimates suggest only 43% of attacks are blocked by conventional antivirus tools.

So why is the launch of Polymorphing for SUSE Linux Enterprise Server so exciting? Well, Polymorphing for Linux takes a ground-breaking approach, using a polymorphic compiler to scramble the code at the binary level without impacting performance, functions or development processes. This means that memory exploits, the most common and dangerous CVEs, simply don’t work and your mission critical systems, databases and applications are protected whether your systems are patched – or not!

I’ve been to the live face to face SUSECON and although I’m sad not to be able to do Dublin, I’m also curious to see the event take on a new form and we’re happy to support it. Polyverse is a Terabyte sponsor at SUSECON Digital 2020 and is delivering two sessions during SUSECON Digital with its partners Novacoast and Sysdig so please do join us. We’ll be online during the sessions to take questions.

And on a final note, as the partner lead here at Polyverse, I’m actively seeking channel and system integrator partners who are interested in adding an additional, and very important layer of security to their Linux solutions. We have a very channel-friendly model and believe we can help Channel Partners provide significant value to their customers by stopping attacks before they start.  Contact me at to learn more…”

“How to secure your containerized and Kubernetes-based workloads”

In this session Polyverse and Sysdig will show you how to secure your containerized and Kubernetes based workloads.

Rui Maximo, Director of Solutions Engineering, Polyverse

Alex Lawrence, Principal Solutions Engineer, Sysdig

Wednesday, May 20 | 03:00 PM – 03:30 PM BST |

“Securing SUSE Linux Enterprise against zero-day cyberattacks”

In this session, learn how easy it is to Polymorph SUSE Linux and how to best integrate with other SUSE tools such as SUSE Manager to create a more secure and easier to manage environment.

Rui Maximo, Director of Solutions Engineering, Polyverse

Dan Elder, Linux Services Manager, Novacoast

Wednesday, May 20 | 03:30 PM – 04:00 PM BST

Interested in learning more?

Be the first to hear about the latest product releases and cybersecurity news.

The registered trademark Linux® is used pursuant to a sublicense from the Linux Foundation, the exclusive licensee of Linus Torvalds, owner of the mark on a world­wide basis.