Work together with our team of
world-class experts in Linux security
Thank you for your interest in grsecurity. Get started by filling the form below and we'll get back to you as soon as possible. Our FAQ may help address your pre-sales questions.
Stable Subscription
- Year subscription
- Stable patch series
- Flexible pricing tailored to your organization's needs
- Detailed writeups on published exploits and silently-fixed Linux kernel vulnerabilities
- Policy and configuration auditing
- Direct access to grsecurity developers
- Integration assistance
Stable Subscription
+ Pro Support
- Year subscription
- Stable patch series
- Flexible pricing tailored to your organization's needs
- Detailed writeups on published exploits and silently-fixed Linux kernel vulnerabilities
- Policy and configuration auditing
- Direct access to grsecurity developers
- Integration assistance
Contact Form
Offerings are tailored specifically to your organization's needs. Contact us for pricing or use the form below.
contact@grsecurity.net +1 949-424-7732Services
Testimonials
The technology behind Grsecurity/PaX is known the world over by top tier practitioners as the most effective stack of hardening measures for Linux. What most of us don't learn until we start to work with Grsecurity commercially is that the support deliverable blows the competition away by the same margin.
Grsecurity has been an essential part of our defensive strategy for years. The hardening features have kept us from being vulnerable to the majority of kernel CVEs. Mr. Spengler's analysis of kernel CVEs is in depth and timely. Grsecurity is invaluable.
We have been using grsecurity as part of our container based application streaming delivery solution for the enterprise. Grsecurity has provided us the differentiation we needed over the legacy solutions, especially in the areas of exploitation resilience and trusted execution. I would highly recommend grsecurity to anybody who wants to build a solution over a secure and robust foundation. It is a must-have.
For security-oriented webhosters like us, grsecurity is essential. It raises the bar for common exploitation techniques significantly and prevents most kernel-related exploits, saving us a lot of time and stress.
When building systems that hold sensitive customer data, no other platform is as trusted by professional security engineers, like those at Immunity, than grsecurity. We have 15 years of experience breaking systems, and grsecurity has 15 years of experience protecting them from people like us.
Draper strongly recommends grsecurity to all of our Department of Defense (DoD) customers so they have the latest and state-of-the-art in vulnerability prevention and exploit defense.