2016_HSA_Yrbk_YUMPU_r2___
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
GSN <strong>2016</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />
<strong>2016</strong><br />
Vendors of IT and Cybersecurity Products and Solutions<br />
illusive networks<br />
<strong>2016</strong> Winner<br />
Awards Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Endpoint Detection and Response Solution<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
illusive networks’ premise is that “you cannot keep applying<br />
the same approach hoping for a different result”.<br />
It tackles cyber security from a different angle - the<br />
perspective of the attackers. Focusing on the actors of<br />
the attack, rather than just their instruments, it exploits<br />
their vulnerabilities, changing the asymmetry of cyber<br />
warfare.<br />
illusive networks pioneered a new type of defensedeception<br />
based cybersecurity. Its patent pending<br />
Deceptions Everywhere ® technology is a deception<br />
management system (DMS) that neutralizes targeted<br />
attacks and Advanced Persistent Threats (APT). It distributes,<br />
monitors and continuously manages deceptions by<br />
weaving a deceptive layer over the entire network. This<br />
means that every endpoint, server and network component<br />
is coated with deceptions. The moment an attacker<br />
penetrates the network, they are in an ‘illusive’ world<br />
where all the data is unreliable.<br />
Alternative ‘Solutions’<br />
Before Deceptions Everywhere, enterprises were<br />
relying on honeypot vendors. Honeypots have a low<br />
detection rate, high level of false positives, are easily<br />
traceable, hard to deploy and complicated to maintain.<br />
They look for malware, but build passive honeypots that<br />
the attackers may or may not stumble upon.<br />
Illusive’s deceptions change dynamically over time<br />
and best fit the environment. Highly dynamic, scalable<br />
and effective, illusive differs from its competitors:<br />
• identifies and visualizes attack risks before the<br />
attack takes place<br />
• visualizes where deceptions are deployed across<br />
the network<br />
• visualizes incident alert location on a map which<br />
24