• HOME
  • CATEGORIES

    • CATEGORIES

    • Browse All Categories
  • FOR VENDORS

    • FOR VENDORS

    • Log In to Vendor Portal
    • Get Started
  • REVIEWS

    • REVIEWS

    • Write a Review
    • Product Reviews
    • Vendor Directory
    • Product Comparisons
  • GARTNER PEER COMMUNITY™
  • GARTNER.COM
  • Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQPrivacyTerms of Service
    ©2026 Gartner, Inc. and/or its affiliates.
    All rights reserved.
  • Categories

    • No categories available

      Browse All Categories

      Select a category to view markets

  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.

Best Automated Moving Target Defense Reviews 2026 | Gartner Peer Insights

What is Automated Moving Target Defense?

Automated Moving Target Defense (AMTD) is a set of technologies and methods to make unpredictable automated changes to an IT environment, making it significantly harder for attackers to identify and exploit vulnerabilities. AMTD integrates proactive defense mechanisms that continuously alter the IT landscape, automation to seamlessly orchestrate these changes, and deception technologies to mislead attackers. Additionally, it utilizes intelligent change decisions based on threat intelligence and automated responses. By increasing complexity and unpredictability, AMTD enhances the security of endpoints, cloud infrastructure, and other digital assets, providing a robust defense against advanced cyber threats. This approach shifts from traditional detection and response to preemptive defense and unpredictable change.

How Categories and Markets Are Defined
All Categories
/
Automated Moving Target Defense

Automated Moving Target Defense Reviews and Ratings

Popular Product Comparisons

Morphisec vs ShadowPlex Advanced Threat DefenseArms Cyber vs MorphisecArms Cyber vs RunSafe Security PlatformRunSafe Security Platform vs ShadowPlex Advanced Threat Defense

Product Listings

Filter by

Products 1 - 13 of 13
Sort by
Logo of ShadowPlex Advanced Threat Defense

ShadowPlex Advanced Threat Defense

By Acalvio

4.8
(16 Ratings)

ShadowPlex Advanced Threat Defense is a software designed to detect, investigate, and respond to advanced cyber threats in enterprise environments. The software leverages deception technology and artificial intelligence to identify malicious activities and lateral movements within networks. It automates threat detection processes by deploying decoys and lures, which are used to expose unauthorized behaviors and attacker tactics without impacting normal operations. ShadowPlex Advanced Threat Defense enables security teams to analyze and correlate threat intelligence, streamline incident response, and reduce dwell time of threats. The software aims to address the challenge of detecting sophisticated attacks that evade traditional security solutions, supporting organizations in enhancing their cybersecurity posture.

Show More Details
Logo of Morphisec

Morphisec

By Morphisec

4.7
(15 Ratings)

Morphisec is a software that focuses on endpoint security by utilizing moving target defense technology to prevent advanced cyberattacks. The software operates by dynamically morphing the memory structure of systems to thwart threats such as ransomware, fileless malware, and other evasive attacks. Its features include real-time protection with minimal system impact and integration with existing security ecosystems. Morphisec addresses the business problem of preventing breaches and reducing vulnerability exposure, aiming to provide organizations with adaptive security that operates independently of signature or behavior-based detection methods. The software is designed to support centralized management and scalable deployment across multiple endpoints in various environments.

Show More Details
Logo of Arms Cyber

Arms Cyber

By ARMS Cyber Defense

5
(1 Rating)

Arms Cyber is a software that offers cybersecurity solutions designed to detect, prevent, and respond to cyber threats across various digital environments. The software provides features such as threat intelligence, vulnerability assessment, and real-time monitoring to help organizations safeguard their data and IT infrastructure. By leveraging advanced analytics and automated response mechanisms, Arms Cyber supports businesses in identifying potential risks and minimizing disruptions caused by security incidents. The software addresses the challenge of protecting sensitive information against unauthorized access, malware, and cyberattacks, enabling organizations to maintain operational integrity and compliance with security standards.

Show More Details
Logo of DispersiveCloud

DispersiveCloud

By Dispersive

4
(1 Rating)

DispersiveCloud is a software designed to provide secure networking solutions through the implementation of advanced cloud-native architectures. The software enables organizations to create encrypted connections and dynamically route network traffic to help protect data in transit. DispersiveCloud is utilized to address business challenges related to network security, scalability, and performance. It offers features such as overlay networks, dynamic multipath routing, and segmentation policies to support the deployment of secure, resilient applications across diverse environments including cloud, on-premises, and hybrid infrastructures. The software is engineered to reduce attack surfaces and maintain compliance with regulatory requirements while facilitating efficient and reliable connectivity for distributed resources.

Show More Details
Logo of RunSafe Security Platform

RunSafe Security Platform

By RunSafe Security

4
(1 Rating)

Identify risk, protect code, and monitor software with the RunSafe Security Platform.

RunSafe Identify generates Software Bill of Materials for embedded systems, identifies vulnerabilities, and quantifies available risk reduction for the identified vulnerabilities.

RunSafe Protect mitigates cyber exploits by relocating software functions in memory every time the software is run, resulting in a unique memory layout, preventing attackers from exploiting memory-based vulnerabilities. This approach maintains system performance and functionality without modifying the original software. Additionally, RunSafe offers a repository of pre-hardened open-source packages and containers, providing immediate protection against attacks in open source software commonly used in proprietary software.

RunSafe Monitor provides real time crash data, along with heuristics to determine whether a crash was a software bug or the result of a cyber attack.

Show More Details
Logo of Deception360

Deception360

By PacketViper

Deception360 is a software designed to enhance cybersecurity by deploying deceptive resources within an organization’s network environment. The software uses decoys, lures, and traps to detect, analyze, and respond to unauthorized or suspicious activities in real time. Deception360 supports threat detection and incident response by generating alerts when malicious actors interact with deceptive assets, enabling organizations to identify potential threats at various stages of the attack lifecycle. The software is scalable across enterprise networks and aims to reduce false positives, facilitate threat intelligence, and support compliance with security frameworks. Deception360 addresses challenges related to advanced threat detection, lateral movement, and early breach identification in complex IT environments.

Be the first to .
Logo of Dispel

Dispel

By Dispel

Dispel is a software designed to secure remote access to operational technology environments by utilizing moving target defense and encrypted network pathways. The software offers features such as real-time monitoring, multi-factor authentication, and user activity logging to enhance control and accountability. Dispel focuses on mitigating risks associated with remote connectivity by dynamically changing network routes, reducing exposure to potential cyber threats. The software is used by organizations to facilitate secure administration and maintenance of industrial systems while addressing the business problem of unauthorized access and persistent threats in remote operational networks.

Be the first to .
Logo of Hopr

Hopr

By Hopr

Hopr is a software designed to enhance privacy and security for data communication across networks. The software provides decentralized, token-incentivized mixnet technology that allows users to transmit information anonymously by routing data through multiple nodes. It addresses the business problem of network surveillance and data exposure by preventing the identification of source and destination in digital transmissions. Hopr supports organizations and individuals who require confidentiality in their network traffic, providing features such as node operation, staking mechanisms, and integration with blockchain projects to maintain data protection while ensuring message integrity and reliable delivery through decentralized infrastructure.

Be the first to .
Logo of Lokimesh Deception Platform

Lokimesh Deception Platform

By Lokimesh

Lokimesh Deception Platform is a software that creates and manages decoy environments to detect and respond to cyber threats within organizational networks. The software deploys deception assets such as fake endpoints, file shares, and credentials that mimic legitimate systems, aiming to mislead attackers and identify suspicious activities. It provides real-time alerts, threat intelligence, and analytics to help security teams understand attacker behavior and improve incident response. By simulating various attack scenarios, the software assists in uncovering vulnerabilities in network infrastructure and supports compliance by documenting attempted breaches. Lokimesh Deception Platform addresses the business problem of proactive threat detection and enhances network security posture without disrupting actual operations.

Be the first to .
Logo of Netenrich Resolution Intelligence Cloud

Netenrich Resolution Intelligence Cloud

By Netenrich

Netenrich Resolution Intelligence is a software designed to enhance operations and security management for enterprises by integrating and analyzing data from diverse IT and security environments. The software offers capabilities such as data correlation, threat detection, and risk prioritization, assisting teams in identifying and addressing issues across infrastructure, applications, and security operations centers.

RIC continuously correlates security telemetry, posture data, and entity context to deliver situational awareness and risk-aligned outcomes, not just alerts.

It supports incident investigation and response workflows by providing context and recommendations based on data insights. Resolution Intelligence is used to help organizations manage operational complexity, reduce risk, and streamline incident resolution through automation and intelligent analytics.

Be the first to .
Logo of NexiTech

NexiTech

By NexiTech

NexiTech is a software that provides workflow automation and digital transformation solutions for enterprises. The software offers functionalities such as data integration, cloud-based process management, and customizable analytics dashboards. It enables organizations to centralize and automate business operations, aiming to reduce manual tasks and enhance operational efficiency. NexiTech supports integration with various third-party applications and offers tools for collaborative work, secure data storage, and reporting. This software addresses business challenges related to process inefficiencies by streamlining routine activities and improving visibility into organizational performance.

Be the first to .
Logo of R6 Security Phoenix

R6 Security Phoenix

By R6 Security

R6 Security Phoenix is a software designed to support organizations in managing information security and compliance. The software provides modules for tracking and reporting on cybersecurity frameworks, policies, risk assessments, and audit management. It assists businesses in centralizing documentation, automating workflow processes, and generating reports related to their security compliance posture. The software offers tools to identify potential vulnerabilities and supports users in adhering to regulatory standards and industry requirements. By facilitating structured risk and compliance management, the software helps mitigate potential threats and ensures more efficient handling of information security obligations.

Be the first to .
Logo of Zynap

Zynap

By Zynap

Zynap is an AI-driven cybersecurity orchestration platform designed to transform Threat Intelligence and Digital Risk Protection into contextual, predictive, and operationally measurable outcomes, enabling organizations to anticipate, validate, and preempt risks before they materialize. Rather than focusing solely on detection and post-incident response, Zynap connects intelligence, exposure data, and operational context into a unified execution layer that continuously evaluates potential threats against the organization’s real attack surface. By combining automation, contextual enrichment, and decision-driven workflows, it supports a shift from reactive monitoring toward predictive and preemptive cybersecurity strategies aligned with business resilience objectives.

Be the first to .