K2 Cyber Security Takes Deterministic Approach to Threat Detection | Cloud Workload Security Platform

K2 Cyber Security Takes Deterministic Approach to Threat Detection

News Highlights

February 20, 2019

K2 Cyber Security Takes Deterministic Approach to Threat Detection

The startup emerges from stealth with a different approach to helping organizations prevent attacks and segment cloud workloads.

There are a lot of cyber-security startups that make use of artificial intelligence to help organizations detect new threats, but K2 Cyber Security isn’t one of them.

K2 officially emerged from stealth on Feb. 20 along with its cloud workload security platform that takes a deterministic real-time approach to help prevent threats, as well as protect organizations with workload isolation. Determinism is all about being able to repeat the same activity in the same way, which is enabled on the K2 platform with a technology the company refers to as Optimized Control Flow Integrity (CFI).

Read more about this news here


K2 Cyber Security delivers the Next Generation Application Workload Protection Platform to secure web applications and container workloads against sophisticated attacks including OWASP Top 10 and memory-based attacks, and provides additional vulnerability detection. K2’s Platform is deployed on production servers for runtime protection of applications and on pen-testing/pre-production servers to identify the location of the vulnerable code in real-time. K2’s solution generates almost no false alerts, eliminates breaches due to zero-day attacks, detects attacks missed by traditional security tools including Web Application Firewalls, and dramatically reduces security cost. K2 Cyber Security is located in the USA, and provides cyber security solutions globally.


K2 Cyber Security, Inc.

2580 N. First Street, #130

San Jose, CA 95131