Illusive Networks, the leader in deception-based cyber defense solutions, announced that it has been identified as a Sample Vendor in the Gartner Hype Cycle for Security Operations, 2020. Illusive was named in the Deception Platforms category.
Read More: Airship Launches Free Feature Flags By Apptimize, Allowing Mobile App Product Owners To Confidently Adapt To The New-Normal      Â
According to the report, “deception platforms offer high-fidelity artifacts (e.g., decoys, lures or honeytokens) that look real and useful, but are fake and created only for attackers to touch and engage with. These artifacts should not be interacted with — hence almost zero false positives — but attackers are statistically bound to trigger one as they perform lateral movement in organizations.”
Using Illusive Networks’ distributed deception technology, organizations eliminate high-risk pathways to critical systems, detect attackers early in the attack process, and capture real-time forensics that focus and accelerate incident response and improve resilience. Through simple, agentless technology, Illusive provides nimble, easy-to-use solutions that enable organizations to continuously improve their cyber risk posture and function with greater confidence and agility.
Read More:Â Collibra Strengthens Executive Leadership Team To Support Continued Company Growth
The Illusive Platform reduces the attack surface by identifying attack paths, removing excess connectivity and providing analysts with actionable data to enable informed decision making. The platform cloaks the entire environment with agentless deceptive information that looks and feels authentic. When triggered, the platform silently alerts analysts, collects detailed forensics and provides high-fidelity incident notifications with a low rate of false positives.
Pete Shoard, senior director and analyst, Gartner, said in the report:Â “Security and risk management leaders who want to develop a threat detection initiative can invest in deception platforms as a low-cost and high-impact complement (or more rarely as a replacement) for SIEM, EDR and NDR tools offering high-fidelity sensors. Forward-leaning and mature clients can also benefit from the added value from deception platforms. These benefits include generation of decoys that will increase an attacker’s dwell time, or generation of local indicators of compromise (IOCs) and other threat intelligence (TI) which can give feedback into their TI efforts.”
Read More:Â SalesTechStar Interview With Trent Mayberry, Chief Digital Officer At UST Global