Webinar: The Attack on Sony.

Thursday, January 29, 2015 at 9 a.m. PST
Dissection of Destover Malware.



Building The Security
Eco-System. Together.

  • No compromise, best of breed security
  • Integrated protection across endpoints, networks and cloud
  • Scale and flexibility for every environment

Learn More


Version 3.0 Fights Advanced Threats to the Core

Cyphort Advanced Threat Protection Platform Version 3.0 Enhances Context-Awareness for Optimized Threat Mitigation

Learn More


Cyphort Labs Special Report:

POS Malware Revisited

Look What We Found Inside Your Cashdesk.

Download Report


Press Release

CYPHORT | Santa Clara, CA | November 11 , 2014

Cyphort Issues Industry’s First and Only Special Report on Point-of-Sale Malware
Samples Used in 2014 Cyber Attacks Against Retailers


Jan 11-14, 2015 | Jacob K. Javits Convention Center, New York City

NRF’s Big Show 2015


Jan 29, 2015 – 9 a.m. PDT

Malware’s Most Wanted: The Attack on Sony


Posted on December 16th, 2014 by Marion Marschalek

CVE-2014-4114: EvilBunny: Malware Instrumented By Lua

Cyphort in About 2 Minutes

Watch what happens when malware’s ‘most-wanted’ characters meet the Cyphort solution.

What Makes Cyphort Different

CEO Manoj Leelanivas discusses detection, visibility, containment and the scalability available with the Cyphort platform.

IT Security and Control

Chief Architect and Co-founder Dr. Fengmin Gong explains what enterprises need today to accurately detect threats in an actionable way.

The Cyphort Vision

Cyphort leaders discuss why Cyphort was created and Gus Hunt, former CTO of CIA provide perspective on the security space.


Detection of most dangerous, armored and targeted threats. We enable security teams to quickly and accurately determine the existence and severity of an advanced targeted attack.


Visibility across the entire attack surface with a decoupled architecture for the distributed enterprise. Hardware, software, VM and cloud deployment. Multi-OS (Windows, Mac OSX) and multi-application (web, email) ready.


Immediate containment & speedy resolution with business risk based incident prioritization. Leverage existing enforcement infrastructure with automated mitigation and actionable global threat visibility and reporting.


Unlimited scalability with flexible deployment. Scale-out, clustered approach to scalability
Enterprise-wide licensing Seamless platform integration with security & IT ecosystem.

Stay Connected.

Keep up to date with the latest threat
defense tips, news and alerts.