Resource Center

Video
The State of Cybersecurity with Polyverse and 451 Research webinar
With security solutions across 70 different product categories, how does a company decide where to spend their next dollar? Learn more in this pre-recorded webinar.
Documentation
multifactor authentication guide
In order to keep you and your organization as secure as possible we added Multi Factor Authentication (MFA), using Auth0 to your Polyverse account portal. This process supplements your current password authentication by using a device you carry, such as your phone.
Case Study
case study image
This paper demonstrates how to integrate Polymorphic Linux into a GitHub project, giving your projects powerful yet simple security protection.
Video
how polymorphic linux works video
If all humans were identical clones, any simple virus would have led to our extinction. This is precisely what happens to computers today. Polyverse adds diversity to your operating systems and stops memory based attacks.
Research
Survey of Cyber Moving Targets: Second Edition
This survey provides a detailed overview from MIT on the different types of cyber moving-target techniques including a section on Polyverse’s technology.
Research
451 research case study
451 Research data shows a shortage of IT administration and networking skills across technologies. Newer approaches, such as Moving Target Defense, can embed security in the IT infrastructure and result in significant gains in time, skills and resources.
Whitepaper
polyscript whitepaper
Polyscripting scrambles the programming language so hackers are unable to inject any malicious code.
Case Study
microfocus whitepaper
Securing your security information and event management (SIEM) software with polymorphic Moving Target Defense (MTD) technology.
Whitepaper
moving target defense whitepaper
A resilient system is one where breach is assumed, but has defenses designed such that the system can continue to operate safely and reliably.
Video
get to know polyverse
In this video CEO, Alex Gounares, explains the origins of Polymorphic Linux and why it is important for software to be dynamic and unique.
Video
Understanding Spectre: Part 1
Morgan Hein describes in detail what the Spectre vulnerability is, how it works and why it is effective against every chip made in the last two decades.
Whitepaper
Polyverse Product Brief
Polymorphic Linux uses Moving-Target Defense to strategically randomize memory layouts of the target application to stop memory exploitation attacks.
Video
What Startups Should Know about Security
Methods to effectively create execution plans that have a finite cost, are realistic, provide a tangible measurable benefit, are cheap, and cover your bases with customers, investors, and regulators.
Video
How Does Polymorphic Linux Work?
Kiley Williams goes from explaining how to craft a memory-based attack, into how to thwart it, and what a real-world application of Polymorphic Linux looks like.
Video
envisen
Morgan Hein discusses a new Open Source tool, EnVisen, which lets you view the exported symbols and ROP gadget surface area of your binaries in a visually-rich and purposeful way.
Case Study
ISACA Polyverse Case Study
This study conclusively demonstrated the resiliency of Polyverse’s Moving-Target Defense technology against web-application and remote-code exploit attacks.

The registered trademark Linux® is used pursuant to a sublicense from the Linux Foundation, the exclusive licensee of Linus Torvalds, owner of the mark on a world­wide basis.