Overview
XDefender is a next generation Linux security platform combining deterministic runtime protection with Data Loss Prevention (DLP), Supply Chain Security, IaC code security, and advanced AI-Agentic Defense. Powered by a Smart Integrity Baseline, the platform ensures that only verified and trusted processes can execute blocking unauthorized code, and AI-agent-driven threats before they reach the operating system. This deterministic approach stops ransomware, zero-day exploits, SSRF, fileless malware, command injection, API vulnerabilities, CI/CD pipeline risks, and unauthorized data exfiltration at the moment of impact.
Purpose-built for modern Linux environments, XDefender delivers autonomous in-memory attack prevention, application and API security, and OWASP Top 10 protection with near-zero resource usage 0% CPU and 0.1 - 0.3% memory. Its execution control engine enforces binary integrity at layer 2 without signatures, behavioral learning, or cloud dependency, eliminating false positives entirely. XDefender protects the full execution chain: baseline-validated binaries, Linux infrastructure, API endpoints, IaC configurations, and CI/CD security processes ensuring that compromised pipelines, tampered deployments, or manipulated AI agents cannot introduce malicious code into production systems.
Enterprises choose XDefender for its deterministic security model, streamlined deployment, and resilience against AI-enabled attacks. By verifying every process against the trusted baseline, blocking unauthorized data access, and securing the full development lifecycle (from IaC to CI/CD to runtime), XDefender dramatically reduces operational risk and eliminates alert fatigue. Its DLP and supply-chain capabilities protect code integrity and prevent rogue changes during deployments, while its AI-agentic defenses ensure no automated agent can escalate privileges or execute harmful operations. With minimal performance cost, broad VM and cloud compatibility, and seamless scaling across thousands of Linux endpoints, XDefender provides a high-assurance, autonomous protection layer for cloud-native and AI-integrated workloads.
Highlights
- Deterministic Runtime Protection for Linux VMs - Enforces a Smart Integrity Baseline to block unauthorized code, in memory attacks, API abuse, CI/CD pipeline risks, and AI-agentic threats before execution, ensuring zero false positives and near-zero performance impact.
- End-to-End Security Across Infrastructure & DevOps - Provides built-in Data Loss Prevention (DLP), Supply Chain Security, IaC code security, and real-time protection across the full development lifecycle - from code to deployment to runtime.
- Lightweight, Autonomous, and Cloud-Ready - Delivers high-assurance security for cloud and VM environments with 0% CPU, minimal memory usage, and instant API-driven deployment across thousands of Linux endpoints.
Details
Introducing multi-product solutions
You can now purchase comprehensive solutions tailored to use cases and industries.
Features and programs
Financing for AWS Marketplace purchases
Pricing
Dimension | Cost/hour |
|---|---|
t3.small Recommended | $0.02 |
t3.micro | $0.015 |
c5.4xlarge | $0.12 |
c5.2xlarge | $0.08 |
m5.large | $0.04 |
m5.8xlarge | $0.20 |
t3.xlarge | $0.05 |
m5.4xlarge | $0.12 |
m5.2xlarge | $0.08 |
m5.16xlarge | $0.35 |
Vendor refund policy
Refunds are handled on a case-by-case basis. Buyers may request a refund within 7 days of purchase by contacting our support team at alon@bitosec.com . Refunds are not guaranteed and will be evaluated based on usage and activation status of the license.
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
64-bit (x86) Amazon Machine Image (AMI)
Amazon Machine Image (AMI)
An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.
Version release notes
Release Notes - Version 2.1.0 Deterministic Security Model: Full integration of the Smart Integrity Baseline, ensuring only pre-verified processes are allowed to execute. AI-Agentic Defense: First-to-market protection layer specifically designed to block privilege escalation and harmful operations by automated AI agents. Comprehensive Lifecycle Security: Native support for securing the entire pipeline, from IaC and CI/CD to deterministic runtime protection. Zero-Trust Data Protection: Built-in DLP and Supply-Chain security modules to prevent unauthorized data access and rogue deployment changes. Autonomous Protection: Eliminated alert fatigue through deterministic blocking, removing the need for manual threat hunting. Cloud-Scale Ready: Optimized for Ubuntu 24.04 LTS with near-zero performance impact, supporting seamless scaling across thousands of Linux endpoints.
Additional details
Usage instructions
- Initial Login & Registration Once the instance is running, follow these steps to register your agent:
SSH into your instance: Connect to your instance using the ubuntu user:
ssh -i /path/to/key.pem ubuntu@<instance-ip>
Retrieve Temporary Credentials: If you do not have an account on the SaaS SOC platform, unique credentials have been generated inside your instance. Run the following commands to retrieve them:
Username: sudo cat /root/.my-agent-state/temp_username.txt
Password: sudo cat /root/.my-agent-state/temp_password.txt
Complete Registration:
Navigate to https://bitosec.io in your browser.
Log in using the temporary credentials retrieved above.
You will be redirected to a registration page. Enter your permanent account details and create new, secure credentials to complete the setup.
- Activating Protection (XDefender) After registration, the XDefender agent will initially appear in Learning Mode. To enable active security:
Access the Dashboard: Log in to the Bitosec SaaS platform and go to the Agents page.
Locate your Agent: Your new instance should appear in the list within a few minutes.
Enable Secure Mode:
Select the checkbox next to your agent in the table.
Click the Actions button and select Change mode.
In the window that opens, select the Secure option.
Click Submit to confirm.
- Support & Documentation For more detailed guides, technical documentation, and additional information, please visit our website at:
bitosec.com
Support
Vendor support
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.