• HOME
  • CATEGORIES

    • CATEGORIES

    • Application Development

      • Observability Platforms
      • Integrated Development Environment (IDE) Software
      • Enterprise Agile Planning Tools
      • Integration Platform as a Service
      • AI-Augmented Software Testing Tools
      • View All
    • Artificial Intelligence

      • AI Code Assistants (Transitioning to AI Coding Agents)
      • Generative AI Knowledge Management Apps/General Productivity
      • AI Application Development Platforms
      • Conversational AI Platforms
      • Artificial Intelligence Applications in IT Service Management (Transitioning to AI Applications in IT Service Management)
      • View All
    • Cloud Computing

      • Backup and Data Protection Platforms
      • Cloud Database Management Systems
      • Strategic Cloud Platform Services
      • Server Virtualization (Transitioning to Server Virtualization Platforms)
      • Hybrid Cloud Storage
      • View All
    • Customer Relationship Management

      • Contact Center as a Service
      • CRM Customer Engagement Center
      • Digital Experience Platforms
      • Web Content Management
      • Field Service Management
      • View All
    • Data and Analytics

      • Analytics and Business Intelligence Platforms
      • Data Science and Machine Learning Platforms (Transitioning to AI Platforms For Data Science and Machine Learning)
      • Data Integration Tools
      • Process Mining Platforms (Transitioning to Process Intelligence Platforms)
      • Metadata Management Solutions
      • View All
    • Education

      • Manager and Leadership Training
      • Corporate Learning Technologies
      • eLearning Authoring Tools
      • Higher Education Student Information System Software as a Service (Transitioning to Higher Education SaaS Student Information Systems)
      • Digital Learning Content Providers
      • View All
    • Enterprise Networking and Communications

      • Unified Communications as a Service
      • Global WAN Services
      • Edge Distribution Platforms
      • Intranet Packaged Solutions
      • SD-WAN
      • View All
    • Finance

      • Expense Management Software
      • Financial Close and Consolidation Solutions
      • Financial Planning Software
      • Cloud Financial Management Tools
      • Accounts Payable Applications
      • View All
    • Healthcare and Life Sciences

      • Medical Device Security Solutions (Transitioning to Medical Device Risk Management Platforms)
      • Health Navigation Solutions
      • Claim Editor Software
      • Revenue Cycle Management Software (Transitioning to Revenue Cycle Management Solutions)
      • Digital Health Platforms (Transitioning to Healthcare Provider Industry Cloud Platforms)
      • View All
    • Human Resources

      • Employee Recognition and Reward Systems
      • Workforce Management Applications (Transitioning to Workforce Management (WFM) Technology)
      • Digital Employee Experience Management Tools
      • Talent Acquisition (Recruiting) Suites
      • Cloud HCM Suites for Regional and/or Sub-1,000 Employee Enterprises
      • View All
    • IT Infrastructure and IoT

      • Enterprise Wired and Wireless LAN Infrastructure (Transitioning to Enterprise Wired and Wireless LAN)
      • IT Service Management Platforms
      • Endpoint Management Tools
      • Container Management
      • Infrastructure Monitoring Tools
      • View All
    • IT Security

      • Endpoint Protection Platforms
      • Email Security
      • Managed Detection and Response
      • Security Information and Event Management
      • Security Awareness Computer-Based Training
      • View All
    • Legal

      • Contract Life Cycle Management
      • Electronic Signature
      • Governance, Risk and Compliance Tools, Assurance Leaders
      • Compliance Monitoring Solutions
      • Corporate Governance Services
      • View All
    • Manufacturing

      • Enterprise Asset Management Software
      • Manufacturing Execution Systems
      • Global Industrial IoT Platforms
      • PLM Software in Discrete Manufacturing Industries
      • Computer-Aided Design (CAD) Software
      • View All
    • Marketing

      • Video Editing Software
      • Email Marketing
      • Multichannel Marketing Hubs
      • Voice of the Customer Platforms
      • Customer Data Platforms
      • View All
    • Productivity and Collaboration

      • Document Management
      • Collaborative Work Management
      • Visual Collaboration Applications
      • Knowledge Management (KM) Software
      • Adaptive Project Management and Reporting
      • View All
    • Public Sector and Government

      • Government ERP Solutions
      • Government Budgeting and Planning Solution
      • Cloud-Based ERP for U.S. Local Government
      • Citizen Service Delivery
      • Government Contracting Software
      • View All
    • Retail

      • Digital Commerce
      • Digital Commerce Payment Vendors (Transitioning to Digital Commerce Payment Platforms)
      • Retail Workforce Management Applications (Transitioning to Retail Workforce Management Technology)
      • Retail Assortment Management Applications: Long Life Cycle Products
      • Digital Shelf Analytics
      • View All
    • Sales

      • Revenue Enablement Platforms
      • Configure, Price and Quote Applications
      • Sales Force Automation Platforms (Transitioning to CRM Sales Platforms)
      • Revenue Intelligence (Transitioning to Revenue Action Orchestration)
      • Sales Performance Management
      • View All
    • Supply Chain Management

      • Supply Chain Planning Solutions
      • Transportation Management Systems
      • Real-Time Transportation Visibility Platforms
      • Warehouse Management Systems
      • Supply Chain Strategy, Planning and Operations Consulting
      • View All
    • Utilities

      • Geospatial Information Systems for Energy and Utilities
      • Mobile Workforce Management Software for Utilities (Transitioning to Mobile Workforce Management Solutions for Power and Utilities)
      • Energy Management and Optimization Systems
      • Energy Trading and Risk Management
      • Advanced Distribution Management Systems
      • View All
    • Browse All Categories
  • FOR VENDORS

    • FOR VENDORS

    • Log In to Vendor Portal
    • Get Started
  • REVIEWS

    • REVIEWS

    • Write a Review
    • Product Reviews
    • Vendor Directory
    • Product Comparisons
  • GARTNER PEER COMMUNITY™
  • GARTNER.COM
  • Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQPrivacyTerms of Service
    ©2026 Gartner, Inc. and/or its affiliates.
    All rights reserved.
  • Categories

      • Application Development
      • Artificial Intelligence
      • Cloud Computing
      • Customer Relationship Management
      • Data and Analytics
      • Education
      • Enterprise Networking and Communications
      • Finance
      • Healthcare and Life Sciences
      • Human Resources
      • IT Infrastructure and IoT
      • IT Security
      • Legal
      • Manufacturing
      • Marketing
      • Productivity and Collaboration
      • Public Sector and Government
      • Retail
      • Sales
      • Supply Chain Management
      • Utilities
      Browse All Categories

      Application Development

      69 markets
      • Observability Platforms
      • Integrated Development Environment (IDE) Software
      • Enterprise Agile Planning Tools
      • Integration Platform as a Service
      • AI-Augmented Software Testing Tools
      • API Management
      • Enterprise Low-Code Application Platforms
      • Robotic Process Automation
      • Business Orchestration and Automation Technologies
      • Business Process Automation Tools
      • DevOps Platforms (Transitioning to DevSecOps Platforms)
      • Enterprise Architecture Tools
      • Custom Software Development Services
      • Code Review Tools
      • Domain Registrars
      • Digital Adoption Platforms
      • Game Engine Software
      • Website Builders
      • Public Cloud IT Transformation Services (Transitioning to Public Cloud Optimization and Transformation Services)
      • Developer Productivity Insight Platforms
      • API Generation Software
      • AI Agents for Application Developers
      • Feature Management
      • Application Platforms (Transitioning to Cloud-Native Application Protection Platforms)
      • Application Crowdtesting Services
      • Prototyping Software
      • Mobile App Analytics
      • Test Data Management
      • Virtual Reality Development Software
      • Green Software Engineering
      • Application Integration Platforms
      • Application Testing Services, Worldwide (Transitioning to Quality Engineering Services)
      • Event Brokers
      • AI-Augmented Code Modernization Tools
      • Independent Third-Party Software Support of Megavendors
      • Microsoft 365 Implementation and Support Services
      • Application Development Life Cycle Management (Transitioning to DevOps Platforms)
      • Digital Twin of an Organization Platforms
      • BPM-Platform-Based Case Management Frameworks
      • Microsoft Product Support Services
      • Product Roadmapping Tools for Software Engineering
      • AI Agent Development Platforms for Software Engineering
      • Application Composition Platform
      • Multiexperience Development Platforms
      • Application Portfolio Management Tools
      • Internal Developer Portals
      • Load Testing Tools
      • Mobile Development Frameworks
      • Cloud Development Environments
      • B2B Gateway Software
      • SAP S/4HANA Application Services, Worldwide (Transitioning to Cloud ERP Services)
      • Blockchain Consulting and Proof-of-Concept Development Services
      • Citizen Application Development Platforms
      • Mobile Application Testing Services
      • API and MCP Testing Tools
      • Value Stream Management Platforms
      • Oracle Cloud Application Services, Worldwide (Transitioning to Cloud ERP Services)
      • SAP Application Services, Worldwide
      • SAP SuccessFactors Service Providers (Transitioning to Cloud ERP Services)
      • Service Mesh
      • Business-Outcome-Driven Enterprise Architecture Consulting (Retired)
      • Oracle Application Services, Worldwide (Transitioning to Cloud ERP Services)
      • Rapid Mobile App Development Tools
      • SAP Selective Test Data Management Tools
      • Augmented Reality Development Software
      • Blockchain as a Service
      • Mobile Application Management (Transitioning to Endpoint Management Tools)
      • Mobile Back-End Services
      • R&D Outsourcing Providers
      View More
  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
All Categories
/
Automated Moving Target Defense

Automated Moving Target Defense Reviews and Ratings

What is Automated Moving Target Defense?

Automated Moving Target Defense (AMTD) is a set of technologies and methods to make unpredictable automated changes to an IT environment, making it significantly harder for attackers to identify and exploit vulnerabilities. AMTD integrates proactive defense mechanisms that continuously alter the IT landscape, automation to seamlessly orchestrate these changes, and deception technologies to mislead attackers. Additionally, it utilizes intelligent change decisions based on threat intelligence and automated responses. By increasing complexity and unpredictability, AMTD enhances the security of endpoints, cloud infrastructure, and other digital assets, providing a robust defense against advanced cyber threats. This approach shifts from traditional detection and response to preemptive defense and unpredictable change.

How Categories and Markets Are Defined

Product Listings

Filter by

Products 1 - 12 of 12
Sort by
Logo of ShadowPlex Advanced Threat Defense

ShadowPlex Advanced Threat Defense

By Acalvio

4.9
(16 Ratings)

ShadowPlex Advanced Threat Defense is a software designed to detect, investigate, and respond to advanced cyber threats in enterprise environments. The software leverages deception technology and artificial intelligence to identify malicious activities and lateral movements within networks. It automates threat detection processes by deploying decoys and lures, which are used to expose unauthorized behaviors and attacker tactics without impacting normal operations. ShadowPlex Advanced Threat Defense enables security teams to analyze and correlate threat intelligence, streamline incident response, and reduce dwell time of threats. The software aims to address the challenge of detecting sophisticated attacks that evade traditional security solutions, supporting organizations in enhancing their cybersecurity posture.

Show More Details
Logo of Morphisec

Morphisec

By Morphisec

4.7
(15 Ratings)

Morphisec is a software that focuses on endpoint security by utilizing moving target defense technology to prevent advanced cyberattacks. The software operates by dynamically morphing the memory structure of systems to thwart threats such as ransomware, fileless malware, and other evasive attacks. Its features include real-time protection with minimal system impact and integration with existing security ecosystems. Morphisec addresses the business problem of preventing breaches and reducing vulnerability exposure, aiming to provide organizations with adaptive security that operates independently of signature or behavior-based detection methods. The software is designed to support centralized management and scalable deployment across multiple endpoints in various environments.

Show More Details
Logo of Arms Cyber

Arms Cyber

By ARMS Cyber Defense

5
(1 Rating)

Arms Cyber is a software that offers cybersecurity solutions designed to detect, prevent, and respond to cyber threats across various digital environments. The software provides features such as threat intelligence, vulnerability assessment, and real-time monitoring to help organizations safeguard their data and IT infrastructure. By leveraging advanced analytics and automated response mechanisms, Arms Cyber supports businesses in identifying potential risks and minimizing disruptions caused by security incidents. The software addresses the challenge of protecting sensitive information against unauthorized access, malware, and cyberattacks, enabling organizations to maintain operational integrity and compliance with security standards.

Show More Details
Logo of DispersiveCloud

DispersiveCloud

By Dispersive

4
(1 Rating)

DispersiveCloud is a software designed to provide secure networking solutions through the implementation of advanced cloud-native architectures. The software enables organizations to create encrypted connections and dynamically route network traffic to help protect data in transit. DispersiveCloud is utilized to address business challenges related to network security, scalability, and performance. It offers features such as overlay networks, dynamic multipath routing, and segmentation policies to support the deployment of secure, resilient applications across diverse environments including cloud, on-premises, and hybrid infrastructures. The software is engineered to reduce attack surfaces and maintain compliance with regulatory requirements while facilitating efficient and reliable connectivity for distributed resources.

Show More Details
Logo of RunSafe Security Platform

RunSafe Security Platform

By RunSafe Security

4
(1 Rating)

Identify risk, protect code, and monitor software with the RunSafe Security Platform.

RunSafe Identify generates Software Bill of Materials for embedded systems, identifies vulnerabilities, and quantifies available risk reduction for the identified vulnerabilities.

RunSafe Protect mitigates cyber exploits by relocating software functions in memory every time the software is run, resulting in a unique memory layout, preventing attackers from exploiting memory-based vulnerabilities. This approach maintains system performance and functionality without modifying the original software. Additionally, RunSafe offers a repository of pre-hardened open-source packages and containers, providing immediate protection against attacks in open source software commonly used in proprietary software.

RunSafe Monitor provides real time crash data, along with heuristics to determine whether a crash was a software bug or the result of a cyber attack.

Show More Details
Logo of Dispel

Dispel

By Dispel

Dispel is a software designed to secure remote access to operational technology environments by utilizing moving target defense and encrypted network pathways. The software offers features such as real-time monitoring, multi-factor authentication, and user activity logging to enhance control and accountability. Dispel focuses on mitigating risks associated with remote connectivity by dynamically changing network routes, reducing exposure to potential cyber threats. The software is used by organizations to facilitate secure administration and maintenance of industrial systems while addressing the business problem of unauthorized access and persistent threats in remote operational networks.

Be the first to .
Logo of Hopr

Hopr

By Hopr

Hopr is a software designed to enhance privacy and security for data communication across networks. The software provides decentralized, token-incentivized mixnet technology that allows users to transmit information anonymously by routing data through multiple nodes. It addresses the business problem of network surveillance and data exposure by preventing the identification of source and destination in digital transmissions. Hopr supports organizations and individuals who require confidentiality in their network traffic, providing features such as node operation, staking mechanisms, and integration with blockchain projects to maintain data protection while ensuring message integrity and reliable delivery through decentralized infrastructure.

Be the first to .
Logo of Lokimesh Deception Platform

Lokimesh Deception Platform

By Lokimesh

Lokimesh Deception Platform is a software that creates and manages decoy environments to detect and respond to cyber threats within organizational networks. The software deploys deception assets such as fake endpoints, file shares, and credentials that mimic legitimate systems, aiming to mislead attackers and identify suspicious activities. It provides real-time alerts, threat intelligence, and analytics to help security teams understand attacker behavior and improve incident response. By simulating various attack scenarios, the software assists in uncovering vulnerabilities in network infrastructure and supports compliance by documenting attempted breaches. Lokimesh Deception Platform addresses the business problem of proactive threat detection and enhances network security posture without disrupting actual operations.

Be the first to .
Logo of Netenrich Resolution Intelligence

Netenrich Resolution Intelligence

By Netenrich

Netenrich Resolution Intelligence is a software designed to enhance operations and security management for enterprises by integrating and analyzing data from diverse IT and security environments. The software offers capabilities such as data correlation, threat detection, and risk prioritization, assisting teams in identifying and addressing issues across infrastructure, applications, and security operations centers. It supports incident investigation and response workflows by providing context and recommendations based on data insights. Resolution Intelligence is used to help organizations manage operational complexity, reduce risk, and streamline incident resolution through automation and intelligent analytics.

Be the first to .
Logo of NexiTech

NexiTech

By NexiTech

NexiTech is a software that provides workflow automation and digital transformation solutions for enterprises. The software offers functionalities such as data integration, cloud-based process management, and customizable analytics dashboards. It enables organizations to centralize and automate business operations, aiming to reduce manual tasks and enhance operational efficiency. NexiTech supports integration with various third-party applications and offers tools for collaborative work, secure data storage, and reporting. This software addresses business challenges related to process inefficiencies by streamlining routine activities and improving visibility into organizational performance.

Be the first to .
Logo of R6 Security Phoenix

R6 Security Phoenix

By R6 Security

R6 Security Phoenix is a software designed to support organizations in managing information security and compliance. The software provides modules for tracking and reporting on cybersecurity frameworks, policies, risk assessments, and audit management. It assists businesses in centralizing documentation, automating workflow processes, and generating reports related to their security compliance posture. The software offers tools to identify potential vulnerabilities and supports users in adhering to regulatory standards and industry requirements. By facilitating structured risk and compliance management, the software helps mitigate potential threats and ensures more efficient handling of information security obligations.

Be the first to .
Logo of Zynap

Zynap

By Zynap

Zynap is an AI-driven cybersecurity orchestration platform designed to transform Threat Intelligence and Digital Risk Protection into contextual, predictive, and operationally measurable outcomes, enabling organizations to anticipate, validate, and preempt risks before they materialize. Rather than focusing solely on detection and post-incident response, Zynap connects intelligence, exposure data, and operational context into a unified execution layer that continuously evaluates potential threats against the organization’s real attack surface. By combining automation, contextual enrichment, and decision-driven workflows, it supports a shift from reactive monitoring toward predictive and preemptive cybersecurity strategies aligned with business resilience objectives.

Be the first to .

Popular Product Comparisons

Morphisec vs ShadowPlex Advanced Threat DefenseArms Cyber vs MorphisecArms Cyber vs RunSafe Security Platform

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.