skip to Main Content
Omdia On The Radar: TrueFort Offers Workload Protection via Microsegmentation
Learn
How Service Account Protection and Microsegmentation Help Organizations Meet CMMC 2.0 Requirements
Read Now
A Very Big Thank You
VIDEOS

A Very Big Thank You

We work in cybersecurity, so getting our clients to commit to helping us create success stories has always been tricky. We may, however, have a way around that... Check out our latest video.

Read more
Why Microsegmentation is Essential for PCI DSS 4.0 compliance
GUIDES

Why Microsegmentation is Essential for PCI DSS 4.0 Compliance

To bring their environments into compliance, organizations should look toward microsegmentation solutions that help security teams provide enhanced protection against breaches and penalties.

Read more
VIDEOS

You Can’t Eliminate All Vulnerabilities – But You Can Reduce Their Impact On Your Business

Microsegmentation is finally reaching mainstream viability. Microsegmentation is an innovative security approach that allows you to place security controls between and within applications.

Read more
GUIDES

Buyer’s Guide to Active Application Segmentation for Ransomware Protection

If you want complete ransomware protection, our buyer's guide to active application segmentation provides a comprehensive overview of enforcing security to enable real-time...

Read more
GUIDES

Microsegmentation Made Easy

Application and workload communications are exploding with the increased adoption of microservices- and containerized architectures. As a result...

Read more
GUIDES

How Service Account Protection and Microsegmentation Help Organizations Meet CMMC 2.0 Requirements

Regardless of an organization's security measures compare to CMMC 2.0 today, two key technologies can help you close the gap quickly...

Read more
BRIEFS

TrueFort and Armis: IT/OT and IoT Protection and Visibility

The leading IT and OT security partnership from TrueFort and Armis. Recognizing the need to align IT/OT...

Read more
BRIEFS

TrueFort and CrowdStrike: Microsegmentation Protection

TrueFort integrates with CrowdStrike EDR to provide application workload visibility, lateral movement protection,...

Read more
zero trust thumbnail
VIDEOS

Zero Trust and Your Organization: What It Will Take to Put Theory Into Practice

Zero Trust is essential for modern security architecture and a core protection framework for agile growth...

Read more
REPORTS

Omdia On The Radar: TrueFort Offers Workload Protection via Microsegmentation

Get to know TrueFort’s offering and its microsegmentation using behavioral analysis and continuous monitoring for Zero Trust ...

Read more
VIDEOS

How Can You Protect What You Can’t See?

Applications are often overlooked. In reality, this accidental oversight makes your organization vulnerable....

Read more
lateral movement
VIDEOS

TrueFort Lateral Movement

Detecting and resolving lateral movement issues has been a founding principle at TrueFort. We’ve changed how companies prevent attackers from...

Read more
microsegmentation lateral movement
VIDEOS

Microsegmentation: A Powerful Strategy to Defend Against Lateral Movement

Workload and application communications are exploding with the increased adoption of microservices- and containerized architectures....

Read more
microsegmentation solution brief
BRIEFS

Microsegmentation Solution Brief

Secure environments and efficiently reduce lateral movement by segmenting and isolating applications and workloads while protecting critical assets...

Read more
Restricting Lateral Movement with Microsegmentation 1
GUIDES

Restricting Lateral Movement with Microsegmentation

Gain an understanding of how microsegmentation reduces the attack surface from ransomware and other techniques...

Read more
BRIEFS

Contain Lateral Movement by Protecting Service Accounts

Understand why regulators have recognized that service accounts, or non-human privileged accounts, are high-value targets for attackers....

Read more
VIDEOS

TrueFort™ Microsegmentation

Workload and application communications are exploding with the increased adoption of microservices- and containerized architectures...

Read more
GUIDES

Emphasizing Prevention with Microsegmentation

Cybersecurity has become more difficult as applications become increasingly distributed, and the threat landscape continues to evolve...

Read more
GUIDES

Application Runtime Segmentation

Understanding application behavior is critical to protecting your applications and workloads...

Read more
ARTICLES

Applying Dynamic Response Measures To Fight Ransomware

Implement dynamic defense mechanisms that enforce zero-trust controls based on unexpected application behavior while...

Read more
GUIDES

Automate the Protection of Cloud-native Workloads Against Dynamic Attacks

Automate the Protection of Cloud-native Workloads Against Dynamic Attacks...

Read more
BRIEFS

Mapping TrueFort to the DoD Pillars of Zero Trust

The Federal government has published their zero-trust reference architecture. TrueFort will help you gain insight on the principles and capabilities defined...

Read more
BRIEFS

What You Can Learn From The DOD’s Take on Zero Trust

Understanding the core capabilities and controls and how the TrueFort Platform enables agencies...

Read more
WHITEPAPER

TrueFort™ Platform Overview

Applications manage most business-critical data assets, securing them from threats is a high priority...

Read more
ARTICLES

The Road To Supply Chain Security

Supply chain attacks have become ubiquitous recently. Detecting insider threats, credential misuse, supply chain compromise...

Read more
VIDEOS

TrueFort Platform

TrueFort is an advanced approach to protecting data center and cloud workloads that makes zero-trust architectures possible...

Read more
BRIEFS

TrueFort Platform: Zero Trust Segmentation and Workload Protection

TrueFort zero trust solutions proactively protect applications from APTs, data exfiltration, and many other threats to modern enterprises...

Read more
WHITEPAPER

Managing the Risks of Uncontrolled Service Accounts

The Potential for Compromised Credentials - Managing the risks of uncontrolled Service Accounts...

Read more
BRIEFS

Prevent Lateral Movement by Understanding Privileged Service Account Usage

Service Account Analytics - Prevent Lateral Movement by Understanding Privileged Service Account Usage...

Read more
ARTICLES

Log4j Vulnerability: The Latest Zero Day Challenge

A remote code execution (RCE) “zero day” vulnerability (CVE-2021-44228) was recently discovered in the Apache Log4j2 utility...

Read more
ARTICLES

How To Adopt A Best Practice Approach To Cloud Migrations

Cloud computing has fundamentally changed the way organizations create, store and manage data. It has introduced remarkable...

Read more
GUIDES

Modern Microsegmentation for Modern Threats

Applications and workloads are more distributed than ever, making microsegmentation critical to a zero trust strategy to reduce security and business risk...

Read more
VIDEOS

Introduction to TrueFort

Overview of TrueFort’s unique zero trust platform for securing enterprise application and workload environments...

Read more
TrueFort Cloud Migration
REPORTS

How TrueFort Supports Cloud Migration

TrueFort’s behavior-based approach discovers, illuminates, and maps application dependencies to prevent cloud migration risks and failures...

Read more
TrueFort Cloud Migration
REPORTS

How TrueFort Fortress Supports Cloud Migration

TrueFort’s behavior-based approach discovers, illuminates, and maps application dependencies to prevent cloud migration risks and failures...

Read more
REPORTS

ESG Report: The State of Zero Trust Security Strategies

Fresh insights into planning, purchasing, implementation and results of zero trust strategies from cybersecurity pros...

Read more
TrueFort microsegmentation on-demand webinar
VIDEOS

Stop Cyberthreats with Microsegmentation

Defend your business against modern cyberthreats with TrueFort’s fast-track microsegmentation solution integrated with CrowdStrike...

Read more
TrueFort Case Study-Mfg Microsegmentation
CASE STUDIES

Top Manufacturer Trusts TrueFort Microsegmentation

How a top manufacturer finds a superior behavior-based microsegmentation solution with TrueFort & CrowdStrike...

Read more
TrueFort & CrowdStrike Data Sheet
DATASHEETS

TrueFort & CrowdStrike Data Sheet

Experience how TrueFort extends your CrowdStrike investment for Zero Trust application protection...

Read more
VIDEOS

H-ISAC 2021: Threat Intelligence Presentation

Learn how to reduce your attack surface with application-centric security and what to look for in a solution (healthcare or any sector)...

Read more
VIDEOS

CEO Interview: RSAC 2021

TrueFort CEO Sameer Malhotra talks about the importance of real-time in securing critical applications and cloud workloads ...

Read more
ARTICLES

Why We Need To Apply Zero Trust To Applications

Applying zero trust concepts to applications can more fully protect from risk, prevent brand damage and avoid business interruption...

Read more
ARTICLES

Why Security Needs An Application-Centric Lens

Applications are high-value targets and an application-centric lens provides new levels of visibility, control and reporting...

Read more
ARTICLES

How to Defend Against Human Operated Ransomware

Application-centric security capabilities help orgs detect ransomware activity early to block and prevent enterprise-scale compromise...

Read more
VIDEOS

Expert Insights on Zero Trust Security

Panel discussion on Zero Trust Security hosted by Cyber Tech & Risk featuring TrueFort CEO Sameer Malhotra...

Read more
REPORTS

EMA Report: Securing Cloud Assets

Analyst report on how peer orgs are approaching cloud workload security, the tools they use, and the top threats to cloud-based assets...

Read more
GUIDES

SolarWinds Indicators of Compromise

A guide to how the SolarWinds attack is executed, indicators of compromise, and TrueFort queries for the relevant insight reports...

Read more
ARTICLES

Reducing The Attack Surface: App Risk Mgmt

Assess, understand and manage risk through an application lens to improve organizational risk posture and reduce the app attack surface...

Read more
VIDEOS

Why App-Centric Security is the Future

Speaker presentation: The Future of Security is Application-centric, presented by Sameer Malhotra CEO, TrueFort at Cyber Tech & Risk..

Read more
GUIDES

Application Environment Security Readiness

How secure is your application environment? See your score on 4 key dimensions. Get recommendations for improving your app risk posture...

Read more
GUIDES

How Application-Centric Security Reduces Risks

How can you protect what you can't see in your application environment? Learn how app-centric security reduces risk to your business...

Read more
REPORTS

2021 TAG Cyber Security Annual

Insights on areas of protection, security technology, trends, and complexities of the cyber security industry...

Read more
VIDEOS

CEO Interview: RSA 2020

TrueFort CEO, Sameer Malhotra interviewed at the RSA 2020 Conference on security trends and the importance of protecting applications...

Read more
GUIDES

CrowdStrike & Fortress: Configuration Guide

Complete integration and deployment instructions for CrowdStrike Falcon and Fortress...

Read more
GUIDES

Fortress: API Guide

Complete documentation of the Fortress platform REST-APIs...

Read more
REPORTS

KuppingerCole Report: The Fortress Platform

Analyst’s review of the TrueFort Fortress platform...

Read more
DATASHEETS

Fortress: Platform 3.x Datasheet

Details on the only platform that delivers real-time application environment self-protection for any cloud or hybrid environment...

Read more
VIDEOS

CrowdStrike & Fortress: Demo

Demonstration of the TrueFort Fortress integration which can be launched from the CrowdStrike Store...

Read more
VIDEOS

CEO Interview: TAG Cyber

TAG Cyber CEO and former CISO, Ed Amoroso, talks with TrueFort CEO & Founder, Sameer Malhotra about next-gen enterprise security...

Read more
DATASHEETS

CrowdStrike & Fortress: Datasheet

Get more from your Falcon agents with comprehensive Cloud Workload Protection from Fortress...

Read more
Back To Top

Bob Williams

Advisor | Venture Partner - West Coast, Canaan

Eileen Spellman

CFO
Maha Ibrahim, Canaan

Maha Ibrahim

Observer | General Partner - West Coast, Canaan

Lane Bess

Member - Principal & Founder, Bess Ventures & Adv.

Matt Hathaway

CMO

Matt Hathaway serves as TrueFort’s Chief Marketing Officer, leading the global marketing strategy to get TrueFort the recognition it deserves. Matt has extensive knowledge of security users, buyers, and landscape, as well as a track record of building high-performing marketing and product teams. He has over 15 years’ experience in the security market that span fraud prevention, vulnerability management, SIEM, cloud workload protection, data security, endpoint protection, and application security.

Prior to joining TrueFort, Mr. Hathaway was VP of Product Marketing at Imperva, a leader in Application and Data Security, where he led Product, Content, and Technical Marketing, SEO, and Competitive Intelligence. He was also VP of Product Marketing at Carbon Black (acquired by VMware), served in multiple product and marketing roles at Rapid7 (including through its IPO), and held product roles at RSA Security and Uptycs.

Charles Collins

Observer - Mng. Director, Emerald Development Ptrs.

Motti Finkelstein

Advisor - Sr. Advisor McKinsey & Company, Capri Ventures

Steve Katz

Advisor - Founder & President, Security Risk Solutions

Truefort customer support

TrueFort customers receive 24×7 support by phone and email, and all software maintenance, releases, and updates

For questions about our support policy, please contact your TrueFort account manager or our presales team at sales@truefort.com.

Support Hotline

Email Support