illusive

Nominated in the Category:

Additional Info

Companyillusive networks
Company size50 employees
Websitehttp://www.illusivenetworks.com

NOMINATION HIGHLIGHTS

illusive networks pioneers deception-based post-breach cybersecurity with its patent pending Deceptions Everywhere™ technology that neutralizes targeted attacks and APTs by creating a deceptive layer across the entire network — agentlessly deployed on every endpoint, server and network component with information that deceives would-be attackers so they can’t tell what is real and what is illusive.

A targeted attack is a process of trial and error. Once attackers breach your network, they slowly and quietly begin collecting data, analyzing it, and making their next move – iteratively. They do not stop until they find what they are looking for – the credit card database or the file-server with client-sensitive information.

Advanced attackers rely on one simple fact – that what they see is real and that the data they collect is reliable. If attackers cannot collect reliable data, they cannot make decisions. And if they cannot make decisions, they are paralyzed.

What if we tamper with that data and create an environment where attackers cannot rely on the information they collect?

That is illusive.

How we are different

- Unmatched Cybersecurity DNA
illusive networks is a 2015 Gartner Security Cool Vendor recognized for its cybersecurity innovation. illusive's R&D is conducted in Israel relying on the state-level security expertise of former IDF Unit 8200 leaders, researchers, and software developers.


- Using the Attacker's Psychology and Methods Against Him
illusive networks changes the asymmetry of APTs with security deceptions that focus on the weaknesses of attackers: their need to believe the data they find and use it for lateral movement infiltration. Unlike old school honeypot deception technology that hopes an attacker will stumble upon it (poor detection, but fair detainment), illusive networks Deceptions Everywhere™ technology places thousands of pieces of data on every network component. An attacker's use of an illusive deception triggers the software and begins monitoring of his movements during, not post-attack.


- Ever Changing, Early Detection, High Fidelity, Low Maintenance
Elegant cybersecurity that is simple to install, provides early detection, real-time forensics, agentless (no executable code resides on the endpoints), no false positives - so an illusive alert equals an attack, low maintenance for security professionals, and is automatically ever changing Deception Families so attackers will never know what to expect.