03.03.2017 Views

2016_HSA_Yrbk_YUMPU_r2___

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

GSN <strong>2016</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

<strong>2016</strong><br />

Vendors of IT and Cybersecurity Products and Solutions<br />

illusive networks<br />

<strong>2016</strong> Winner<br />

Awards Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Endpoint Detection and Response Solution<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

illusive networks’ premise is that “you cannot keep applying<br />

the same approach hoping for a different result”.<br />

It tackles cyber security from a different angle - the<br />

perspective of the attackers. Focusing on the actors of<br />

the attack, rather than just their instruments, it exploits<br />

their vulnerabilities, changing the asymmetry of cyber<br />

warfare.<br />

illusive networks pioneered a new type of defensedeception<br />

based cybersecurity. Its patent pending<br />

Deceptions Everywhere ® technology is a deception<br />

management system (DMS) that neutralizes targeted<br />

attacks and Advanced Persistent Threats (APT). It distributes,<br />

monitors and continuously manages deceptions by<br />

weaving a deceptive layer over the entire network. This<br />

means that every endpoint, server and network component<br />

is coated with deceptions. The moment an attacker<br />

penetrates the network, they are in an ‘illusive’ world<br />

where all the data is unreliable.<br />

Alternative ‘Solutions’<br />

Before Deceptions Everywhere, enterprises were<br />

relying on honeypot vendors. Honeypots have a low<br />

detection rate, high level of false positives, are easily<br />

traceable, hard to deploy and complicated to maintain.<br />

They look for malware, but build passive honeypots that<br />

the attackers may or may not stumble upon.<br />

Illusive’s deceptions change dynamically over time<br />

and best fit the environment. Highly dynamic, scalable<br />

and effective, illusive differs from its competitors:<br />

• identifies and visualizes attack risks before the<br />

attack takes place<br />

• visualizes where deceptions are deployed across<br />

the network<br />

• visualizes incident alert location on a map which<br />

24

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!