Agents are deployed on physical or virtual servers and VMs via an installer and as Kubernetes minion nodes as pods. The K2 agent automatically identifies applications and protect them from attacks.
K2 automatically builds an execution reference for each application or workload to be secured. The K2 agent uses it to validate the runtime state of the application for preventing attacks.
Execution of application is deterministically validated against the Execution Map to allow only legitimate instructions to execute via validated control flow channels
Inconsistency in execution of an application due to an attack will generate a security alert in real-time and can be viewed in user’s own GUI or in SIEM solution