Today’s complex networks include countless attack surfaces that are heavily targeted by cyber attackers. This is where a deception based solution is ideal for its ability to change the asymmetry of an advanced attack, by confusing an attacker and forcing him to choose between real and deception placed information. This stops the lateral movement of the attacker early in the infiltration phase. The instant the attacker chooses a deception and tries to use the information to move to another machine, illusive networks software is triggered. Rich forensics are gathered and IT alerted that a breach is in process without the attacker ever knowing.
illusive’s architecture is unique compared to other cybersecurity solutions. The nature of illusive’s security deceptions identify the lateral movement of attackers the instant they use an illusive deception during the infiltration phase of a cyberattack. Unlike honeypot architectures that are better at detainment than detection, illusive systematically deploys thousands of false, but real looking pieces of information including–credentials, passwords, and file shares– from a central server to every endpoint and server–literally deploying ‘deceptions everywhere’. These deceptions appear identical to an organization’s real information that an advanced attacker would expect to find. Honeypot architectures are inefficient, costly to manage and maintain, and easy to identify by attackers. illusive deceptions are agentlessly deployed across every attack vector. These deceptions are strategically deployed in places that are transparent to end users and only visible to those IT teams that manage the illusive software. This centralized agentless deployment decreases the management costs, and increases the coverage and protection on each attack surface.
We believe that it isn’t about the malware, but about the people behind the malware. Deceiving the attacker stops the attack
“Our agile approach to cybersecurity provides ever changing deceptions that advanced attackers can't tell aren't real,” says Touboul. “We believe that it isn’t about the malware, but about the people behind the malware. Deceiving the attacker stops the attack.” Therefore, illusive provides a complete view of the network connections and attack vectors within a network through its Attacker View™. Armed with a precise, detailed map of how attackers view and traverse a network, Attacker View™ empowers IT security professionals to visualize attack paths and adapt their security strategy to mitigate advanced attacker’s lateral movement. Visualizations of the attack paths enable security deceptions to be deployed to obfuscate the existing attack vectors making the attacker’s job exponentially more difficult.
The company is a researcher, innovator, and solution provider, built with an end goal of mitigating advanced attackers and persistent threats. Working with the vision— “Deceptions Everywhere®,” illusive networks is growing its deception platform by adding a new deception family— Advanced Ransomware Guard that deploys ransomware-specific deceptions across the entire network, endpoints and servers and neutralizes ransomware activity at the source hosts.
illusive networks continues to aggressively research and develop deception solutions and enhancements that are updated bi-monthly to its customers to achieve its vision of Deceptions Everywhere®. Envisioning the future, Touboul says, “Our geographic expansion will be in tandem with strategic channel partners to provide broader coverage for today’s attack surfaces and those that will be discovered tomorrow.”