{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"comparison":{"compare":{"en":"Compare","ru":"Сравнить","_type":"localeString"},"characteristics":{"ru":"Характеристики","_type":"localeString","en":"Characteristics"},"additional_template":{"ru":"Дополнительные характеристики","_type":"localeString","en":"Additional characteristics"},"nothing_to_show":{"_type":"localeString","en":"No data to compare","ru":"Нет данных для отображения"}},"header":{"help":{"en":"Help","de":"Hilfe","ru":"Помощь","_type":"localeString"},"how":{"ru":"Как это работает","_type":"localeString","en":"How does it works","de":"Wie funktioniert es"},"login":{"_type":"localeString","en":"Log in","de":"Einloggen","ru":"Вход"},"logout":{"ru":"Выйти","_type":"localeString","en":"Sign out"},"faq":{"ru":"FAQ","_type":"localeString","en":"FAQ","de":"FAQ"},"references":{"de":"References","ru":"Мои запросы","_type":"localeString","en":"Requests"},"solutions":{"en":"Solutions","ru":"Возможности","_type":"localeString"},"find-it-product":{"en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта","_type":"localeString"},"autoconfigurator":{"en":" Price calculator","ru":"Калькулятор цены","_type":"localeString"},"comparison-matrix":{"en":"Comparison Matrix","ru":"Матрица сравнения","_type":"localeString"},"roi-calculators":{"ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"b4r":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"business-booster":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"catalogs":{"ru":"Каталоги","_type":"localeString","en":"Catalogs"},"products":{"en":"Products","ru":"Продукты","_type":"localeString"},"implementations":{"en":"Deployments","ru":"Внедрения","_type":"localeString"},"companies":{"en":"Companies","ru":"Компании","_type":"localeString"},"categories":{"_type":"localeString","en":"Categories","ru":"Категории"},"for-suppliers":{"_type":"localeString","en":"For suppliers","ru":"Поставщикам"},"blog":{"en":"Blog","ru":"Блог","_type":"localeString"},"agreements":{"en":"Deals","ru":"Сделки","_type":"localeString"},"my-account":{"ru":"Мой кабинет","_type":"localeString","en":"My account"},"register":{"en":"Register","ru":"Зарегистрироваться","_type":"localeString"},"comparison-deletion":{"_type":"localeString","en":"Deletion","ru":"Удаление"},"comparison-confirm":{"ru":"Подтвердите удаление","_type":"localeString","en":"Are you sure you want to delete"},"search-placeholder":{"_type":"localeString","en":"Enter your search term","ru":"Введите поисковый запрос"},"my-profile":{"ru":"Мои данные","_type":"localeString","en":"My profile"},"about":{"_type":"localeString","en":"About Us"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"sub_it_catalogs":{"en":"Find IT product","_type":"localeString"},"sub_b4reference":{"_type":"localeString","en":"Get reference from user"},"sub_roi4presenter":{"_type":"localeString","en":"Make online presentations"},"sub_roi4webinar":{"_type":"localeString","en":"Create an avatar for the event"},"catalogs_new":{"en":"Products","_type":"localeString"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"},"it_our_it_catalogs":{"_type":"localeString","en":"Our IT Catalogs"},"it_products":{"_type":"localeString","en":"Find and compare IT products"},"it_implementations":{"_type":"localeString","en":"Learn implementation reviews"},"it_companies":{"en":"Find vendor and company-supplier","_type":"localeString"},"it_categories":{"en":"Explore IT products by category","_type":"localeString"},"it_our_products":{"en":"Our Products","_type":"localeString"},"it_it_catalogs":{"_type":"localeString","en":"IT catalogs"}},"footer":{"copyright":{"de":"Alle rechte vorbehalten","ru":"Все права защищены","_type":"localeString","en":"All rights reserved"},"company":{"_type":"localeString","en":"My Company","de":"Über die Firma","ru":"О компании"},"about":{"ru":"О нас","_type":"localeString","en":"About us","de":"Über uns"},"infocenter":{"de":"Infocenter","ru":"Инфоцентр","_type":"localeString","en":"Infocenter"},"tariffs":{"en":"Subscriptions","de":"Tarife","ru":"Тарифы","_type":"localeString"},"contact":{"_type":"localeString","en":"Contact us","de":"Kontaktiere uns","ru":"Связаться с нами"},"marketplace":{"_type":"localeString","en":"Marketplace","de":"Marketplace","ru":"Marketplace"},"products":{"en":"Products","de":"Produkte","ru":"Продукты","_type":"localeString"},"compare":{"ru":"Подобрать и сравнить","_type":"localeString","en":"Pick and compare","de":"Wähle und vergleiche"},"calculate":{"_type":"localeString","en":"Calculate the cost","de":"Kosten berechnen","ru":"Расчитать стоимость"},"get_bonus":{"de":"Holen Sie sich einen Rabatt","ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"salestools":{"ru":"Salestools","_type":"localeString","en":"Salestools","de":"Salestools"},"automatization":{"ru":"Автоматизация расчетов","_type":"localeString","en":"Settlement Automation","de":"Abwicklungsautomatisierung"},"roi_calcs":{"ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators","de":"ROI-Rechner"},"matrix":{"en":"Comparison matrix","de":"Vergleichsmatrix","ru":"Матрица сравнения","_type":"localeString"},"b4r":{"_type":"localeString","en":"Rebate 4 Reference","de":"Rebate 4 Reference","ru":"Rebate 4 Reference"},"our_social":{"_type":"localeString","en":"Our social networks","de":"Unsere sozialen Netzwerke","ru":"Наши социальные сети"},"subscribe":{"_type":"localeString","en":"Subscribe to newsletter","de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку"},"subscribe_info":{"ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта","_type":"localeString","en":"and be the first to know about promotions, new features and recent software reviews"},"policy":{"ru":"Политика конфиденциальности","_type":"localeString","en":"Privacy Policy"},"user_agreement":{"en":"Agreement","ru":"Пользовательское соглашение ","_type":"localeString"},"solutions":{"_type":"localeString","en":"Solutions","ru":"Возможности"},"find":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"quote":{"_type":"localeString","en":"Price calculator","ru":"Калькулятор цены"},"boosting":{"en":"Business boosting","ru":"Развитие бизнеса","_type":"localeString"},"4vendors":{"ru":"поставщикам","_type":"localeString","en":"4 vendors"},"blog":{"ru":"блог","_type":"localeString","en":"blog"},"pay4content":{"ru":"платим за контент","_type":"localeString","en":"we pay for content"},"categories":{"en":"categories","ru":"категории","_type":"localeString"},"showForm":{"en":"Show form","ru":"Показать форму","_type":"localeString"},"subscribe__title":{"en":"We send a digest of actual news from the IT world once in a month!","ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!","_type":"localeString"},"subscribe__email-label":{"ru":"Email","_type":"localeString","en":"Email"},"subscribe__name-label":{"_type":"localeString","en":"Name","ru":"Имя"},"subscribe__required-message":{"ru":"Это поле обязательное","_type":"localeString","en":"This field is required"},"subscribe__notify-label":{"ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях","_type":"localeString","en":"Yes, please, notify me about news, events and propositions"},"subscribe__agree-label":{"_type":"localeString","en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data","ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*"},"subscribe__submit-label":{"ru":"Подписаться","_type":"localeString","en":"Subscribe"},"subscribe__email-message":{"_type":"localeString","en":"Please, enter the valid email","ru":"Пожалуйста, введите корректный адрес электронной почты"},"subscribe__email-placeholder":{"ru":"username@gmail.com","_type":"localeString","en":"username@gmail.com"},"subscribe__name-placeholder":{"ru":"Имя Фамилия","_type":"localeString","en":"Last, first name"},"subscribe__success":{"ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString","en":"You are successfully subscribed! Check you mailbox."},"subscribe__error":{"en":"Subscription is unsuccessful. Please, try again later.","ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее.","_type":"localeString"},"roi4presenter":{"en":"Roi4Presenter","de":"roi4presenter","ru":"roi4presenter","_type":"localeString"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"}},"breadcrumbs":{"home":{"ru":"Главная","_type":"localeString","en":"Home"},"companies":{"en":"Companies","ru":"Компании","_type":"localeString"},"products":{"en":"Products","ru":"Продукты","_type":"localeString"},"implementations":{"en":"Deployments","ru":"Внедрения","_type":"localeString"},"login":{"ru":"Вход","_type":"localeString","en":"Login"},"registration":{"ru":"Регистрация","_type":"localeString","en":"Registration"},"b2b-platform":{"ru":"Портал для покупателей, поставщиков и производителей ИТ","_type":"localeString","en":"B2B platform for IT buyers, vendors and suppliers"}},"comment-form":{"title":{"ru":"Оставить комментарий","_type":"localeString","en":"Leave comment"},"firstname":{"_type":"localeString","en":"First name","ru":"Имя"},"lastname":{"_type":"localeString","en":"Last name","ru":"Фамилия"},"company":{"ru":"Компания","_type":"localeString","en":"Company name"},"position":{"ru":"Должность","_type":"localeString","en":"Position"},"actual-cost":{"ru":"Фактическая стоимость","_type":"localeString","en":"Actual cost"},"received-roi":{"ru":"Полученный ROI","_type":"localeString","en":"Received ROI"},"saving-type":{"ru":"Тип экономии","_type":"localeString","en":"Saving type"},"comment":{"ru":"Комментарий","_type":"localeString","en":"Comment"},"your-rate":{"_type":"localeString","en":"Your rate","ru":"Ваша оценка"},"i-agree":{"_type":"localeString","en":"I agree","ru":"Я согласен"},"terms-of-use":{"en":"With user agreement and privacy policy","ru":"С пользовательским соглашением и политикой конфиденциальности","_type":"localeString"},"send":{"en":"Send","ru":"Отправить","_type":"localeString"},"required-message":{"ru":"{NAME} - это обязательное поле","_type":"localeString","en":"{NAME} is required filed"}},"maintenance":{"title":{"en":"Site under maintenance","ru":"На сайте проводятся технические работы","_type":"localeString"},"message":{"ru":"Спасибо за ваше понимание","_type":"localeString","en":"Thank you for your understanding"}}},"translationsStatus":{"comparison":"success"},"sections":{},"sectionsStatus":{},"pageMetaData":{"comparison":{"title":{"ru":"Сравнить продукты","_type":"localeString","en":"Compare products"}}},"pageMetaDataStatus":{"comparison":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{"28":{"id":28,"title":"Deception Techniques and Honeypots","characteristics":[{"id":409,"title":"Web App integration","required":0,"type":"binary"},{"id":411,"title":"C&C detection","required":0,"type":"binary"},{"id":413,"title":"Emulated traps","required":0,"type":"binary"},{"id":415,"title":"NAC integration","required":0,"type":"binary"},{"id":417,"title":"Full OS traps","required":0,"type":"binary"},{"id":419,"title":"SIEM Integration","required":0,"type":"binary"},{"id":421,"title":"Endpoint integration","required":0,"type":"binary"},{"id":423,"title":"Built-in correlation","required":0,"type":"binary"},{"id":425,"title":"Built-in ticketing","required":0,"type":"binary"},{"id":427,"title":"Sanbox integration","required":0,"type":"binary"},{"id":429,"title":"POS","required":0,"type":"binary"},{"id":431,"title":"ATM","required":0,"type":"binary"},{"id":433,"title":"SCADA","required":0,"type":"binary"},{"id":435,"title":"IoT","required":0,"type":"binary"},{"id":437,"title":"Clouds","required":0,"type":"multiselect"},{"id":672,"title":"Open API for integration","required":0,"type":"binary"},{"id":674,"title":"Botnet detection","required":0,"type":"binary"},{"id":676,"title":"Automatic code analysis","required":0,"type":"binary"},{"id":678,"title":"Custom trap builder","required":0,"type":"binary"},{"id":1182,"title":"Deception Tokens (fake OS platforms)","required":0,"type":"multiselect"},{"id":1184,"title":"Detecting attacks in stages","required":0,"type":"multiselect"},{"id":1186,"title":"Detection of MITM","required":0,"type":"binary"},{"id":1188,"title":"Industry-specific lures","required":0,"type":"binary"},{"id":1190,"title":"EDR","required":0,"type":"binary"},{"id":1192,"title":"Orchestration","required":0,"type":"binary"},{"id":1194,"title":"Active Directory","required":0,"type":"binary"},{"id":1196,"title":"Database","required":0,"type":"binary"},{"id":1198,"title":"Shared resource","required":0,"type":"binary"},{"id":1200,"title":"Using client images","required":0,"type":"binary"},{"id":1202,"title":"REST API","required":0,"type":"binary"},{"id":2835,"title":"Firewall","required":0,"type":"binary"},{"id":2837,"title":"IDS","required":0,"type":"binary"},{"id":2839,"title":"IPS","required":0,"type":"binary"},{"id":2833,"title":"Built-in Reporting","required":0,"type":"binary"}]}},"comparisonByTemplateId":{},"products":[{"id":1653,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Acalvio.png","logo":true,"schemeURL":"https://old.roi4cio.com/fileadmin/user_upload/Acalvio_scheme.png","scheme":true,"title":"Acalvio Shadowplex","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"alias":"acalvio-shadowplex","companyTypes":[],"description":"\r\nShadowPlex Autonomous Deception\r\n<ul> <li>Accurate Detection</li> <li>Timely Detection</li> <li>Cost-Effective Detection</li> </ul>\r\nShadowPlex is designed for Enterprise IT, IoT and ICS environments and based on patented innovations.\r\n\r\n<span style=\"font-weight: bold;\">Deception Farms</span>\r\n\r\nDeception-farms is a seminal innovation that delivers scale and adaptability. Sensors are placed in the network segments. All decoys are born and live in a centralized virtual server farm. They are projected onto the network, thus optimizing resource consumption and delivers flexibility.\r\n\r\n<span style=\"font-weight: bold;\">Fluid Deception</span>\r\n\r\nFluid Deception is a patented technology that achieves resource efficiency by just in time decoy creation, minimizing costs, maximizing effectiveness. No longer do you have to choose between emulation and full host decoys.\r\n\r\n<span style=\"font-weight: bold;\">Security Ecosystem Integrations</span>\r\n\r\nShadowPlex provides comprehensive API support allowing Deception campaigns to be orchestrated from other environments. This also facilitates integration with 3rd party security tools such as:\r\n<ul> <li>Threat Intelligence</li> <li>IT Change Management platforms</li> <li>SOAR (Security Orchestration and Response)</li> <li>SIEM</li> <li>Perimeter Defense</li> <li>NAC (Network Access Control)</li> <li>Vulnerability Managers</li> <li>SSO, Identity Management, Privileged User Management Systems</li> <li>EDR, End-point</li> </ul>","shortDescription":"ShadowPlex is an Autonomous, Enterprise-Scale Distributed Deception Platform (DDP)","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Acalvio Shadowplex","keywords":"","description":"\r\nShadowPlex Autonomous Deception\r\n<ul> <li>Accurate Detection</li> <li>Timely Detection</li> <li>Cost-Effective Detection</li> </ul>\r\nShadowPlex is designed for Enterprise IT, IoT and ICS environments and based on patented innovations.\r\n\r\n<span style=\"font-we","og:title":"Acalvio Shadowplex","og:description":"\r\nShadowPlex Autonomous Deception\r\n<ul> <li>Accurate Detection</li> <li>Timely Detection</li> <li>Cost-Effective Detection</li> </ul>\r\nShadowPlex is designed for Enterprise IT, IoT and ICS environments and based on patented innovations.\r\n\r\n<span style=\"font-we","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Acalvio.png"},"eventUrl":"","translationId":1653,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":199,"title":"Deception Techniques and Honeypots","alias":"deception-techniques-and-honeypots","description":"Deception technology is an emerging category of cyber security defense. Deception technology products can detect, analyze and defend against zero-day and advanced attacks, often in real time. They are automated, accurate and provide insight into malicious activity within internal networks, which may be unseen by other types of cyber defense. Deception technology enables a more proactive security posture by seeking to deceive the attackers, detect them and then defeat them, allowing the enterprise to return to normal operations.\r\nDeception technology automates the creation of traps (decoys) and/or lures, which are mixed among and within existing IT resources to provide a layer of protection to stop attackers that have penetrated the network. Traps (decoys) are IT assets that either use real licensed operating system software, or are emulations of these devices.\r\nTraps (decoys) which use emulations can also imitate medical devices, automated teller machines (ATMs), retail point of sale systems, switches, routers and much more. Lures are generally real information technology resources (files of varying kinds) which are placed on actual IT assets.\r\nUpon penetrating the network, attackers seek to establish a backdoor and then use this to identify and exfiltrate data and intellectual property. They begin moving laterally through the internal VLANs and almost immediately will "look at" one of the traps (decoys). Interacting with one of these "decoys" will trigger an alert. These alerts are very high probability and almost always coincide to an ongoing attack. The deception is designed to lure the attacker in – the attacker may consider this a worthy asset and continue by injecting malware. Deception technology generally allows for automated static and dynamic analysis of this injected malware and provides these reports through automation to the security operations personnel. Deception technology may also identify, through indicators of compromise (IOC), suspect end-points that are part of the compromise cycle. Automation also allows for an automated memory analysis of the suspect end-point, and then automatically isolates the suspect end-point. Many partner integrations allow for a variety of implementation paths for existing enterprise and government customers.\r\nInternet of things (IoT) devices are not usually scanned by legacy defense in depth cyber defense and remain prime targets for attackers within the network. Deception technology can identify attackers moving laterally into the network from within these devices.\r\nIntegrated turnkey devices that utilize embedded operating systems, but do not allow these operating systems to be scanned or closely protected by embedded end-point or intrusion detection software are also well protected by a deception technology deployment in the same network. Examples include process control systems (SCADA) used in many manufacturing applications on a global basis. Deception technology has been associated with the discovery of Zombie Zero, an attack vector wherein deception technology identified an attacker utilizing malware embedded in barcode readers which were manufactured overseas.\r\nMedical devices are particular vulnerable to cyber attacks within the healthcare networks. As FDA-certified devices they are closed systems and not accessible to standard cyber defense software. Deception technology can surround and protect these devices and identify attackers using these for backdoor placement and data exfiltration. Recently documented cyber attacks on medical devices include x-ray machines, CT scanners, MRI scanners, blood gas analyzers, PACS systems and many more. Networks utilizing these devices can be protected by deception technology. This attack vector, called medical device hijack or medjack, is estimated to have penetrated many hospitals worldwide.\r\nSpecialized deception technology products are now capable of addressing the rise in ransomware. Select products can deceive ransomware into engaging in an attack on a decoy resource, while isolating the infection points and alerting the cyber defense software team.","materialsDescription":"<span style=\"font-weight: bold;\">Why Use Deception Technology?</span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Early Post-Breach Detection</span></span>\r\nNo security solution can stop all attacks from occurring on a network, but deception technology helps to give attackers a false sense of security by making them believe they have gained a foothold in your network. From here you can monitor and record their behavior, secure in the knowledge that they can do no damage to your decoy systems. The information you record about attacker behavior and techniques can be used to further secure your network from attack.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Reduced False Positives and Risk</span></span>\r\nDead ends, false positives and alert fatigue can all hamper security efforts and put a drain on resources, if they are even analyzed at all. Too much noise can result in IT teams becoming complacent and ignoring what could potentially be a legitimate threat. Deception technology reduces the noise with fewer false positives and high fidelity alerts packed full of useful data.\r\nDeception technology is also a low risk as it has no risk to data or impact on resources or operations. When a hacker accesses or attempts to use part of the deception layer, a real and accurate alert is generated that tells admins they need to take action.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Scale and Automate at Will</span></span>\r\nWhile the threat to corporate networks and data is a daily growing concern, security teams rarely get an increase in their budget to handle the deluge of new threats. For this reason, deception technology can be a very welcome solution. Automated alerts eliminate the need for manual effort and intervention while the design of the technology allows it to be scaled easily as the organization and threat level grows.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">From Legacy to IoT</span></span>\r\nDeception technology can be used to provide breadcrumbs for a vast range of different devices, including legacy environments, industry-specific environments and even IoT devices.<br /><br />"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[],"valuesByTemplateId":{"28":{"409":{"id":1471,"characteristicId":409,"templateId":28,"value":"N/A"},"411":{"id":1472,"characteristicId":411,"templateId":28,"value":"N/A"},"413":{"id":1473,"characteristicId":413,"templateId":28,"value":true},"415":{"id":1474,"characteristicId":415,"templateId":28,"value":true},"417":{"id":1475,"characteristicId":417,"templateId":28,"value":true},"419":{"id":1476,"characteristicId":419,"templateId":28,"value":true},"421":{"id":1477,"characteristicId":421,"templateId":28,"value":true},"423":{"id":1478,"characteristicId":423,"templateId":28,"value":true},"425":{"id":1479,"characteristicId":425,"templateId":28,"value":"N/A"},"427":{"id":1480,"characteristicId":427,"templateId":28,"value":true},"429":{"id":1481,"characteristicId":429,"templateId":28,"value":"N/A"},"431":{"id":1482,"characteristicId":431,"templateId":28,"value":"N/A"},"433":{"id":1483,"characteristicId":433,"templateId":28,"value":true},"435":{"id":1484,"characteristicId":435,"templateId":28,"value":true},"437":{"id":1485,"characteristicId":437,"templateId":28,"value":"AWS, Azure, OpenStack"},"672":{"id":2523,"characteristicId":672,"templateId":28,"value":true},"674":{"id":2524,"characteristicId":674,"templateId":28,"value":"N/A"},"676":{"id":2525,"characteristicId":676,"templateId":28,"value":"N/A"},"678":{"id":2526,"characteristicId":678,"templateId":28,"value":"N/A"},"1182":{"id":5664,"characteristicId":1182,"templateId":28,"value":"Windows"},"1184":{"id":5665,"characteristicId":1184,"templateId":28,"value":"Active reconnaissance, Lateral movement, Exfiltration"},"1186":{"id":5666,"characteristicId":1186,"templateId":28,"value":"N/A"},"1188":{"id":5667,"characteristicId":1188,"templateId":28,"value":"N/A"},"1190":{"id":5668,"characteristicId":1190,"templateId":28,"value":true},"1192":{"id":5669,"characteristicId":1192,"templateId":28,"value":true},"1194":{"id":5670,"characteristicId":1194,"templateId":28,"value":true},"1196":{"id":5671,"characteristicId":1196,"templateId":28,"value":true},"1198":{"id":5672,"characteristicId":1198,"templateId":28,"value":true},"1200":{"id":5673,"characteristicId":1200,"templateId":28,"value":true},"1202":{"id":5674,"characteristicId":1202,"templateId":28,"value":true},"2833":{"id":7863,"characteristicId":2833,"templateId":28,"value":true},"2835":{"id":7860,"characteristicId":2835,"templateId":28,"value":true},"2837":{"id":7861,"characteristicId":2837,"templateId":28,"value":true},"2839":{"id":7862,"characteristicId":2839,"templateId":28,"value":"N/A"}}}},{"id":2200,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/CounterCraft__logo_.jpg","logo":true,"scheme":false,"title":"CounterCraft Cyber Deception Platform","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"alias":"countercraft-cyber-deception-platform","companyTypes":[],"description":"<p>Cyber Deception Platform - detect targeted attacks with a real-time active response that automates counterintelligence campaigns.</p>\r\n<p>We have developed a distributed Deception Platform that protects large enterprises by fooling their adversaries with decoy computers, false data and fake identities.</p>\r\n<p>Our platform offers a new type of detection with trustworthy alerts and real-time active response. It is the first product to automate the design, deployment, monitoring and maintenance of counterintelligence campaigns across all your digital assets.</p>\r\n<p>Our solution works despite the technical complexity of the adversaries’ intrusion and provides a welcome relief from the constant technical race between the attacker and defender. CounterCraft automates counterintelligence, reducing the work burden and costs of creating deception.</p>\r\n<p><span style=\"font-weight: bold;\">BENEFITS:</span></p>\r\n<ol>\r\n<li>A new form of defence – CounterCraft's Cyber Deception Platform is a unique and innovative solution that adds protection to your organisation with a new strategic focus on counterintelligence.</li>\r\n<li>Improve both detection of complex and targeted attacks and the response to them. Boost the capabilities of your current systems with a cyber deception layer and enrichment from our API.</li>\r\n<li>Enhance the efficiency of your team. Leverage security analysts to design campaigns and let the platform handle the drudgery of deployment, orchestration and management.</li>\r\n<li>Easily communicate with board members and key management about the strategic merit of automated deception campaigns. Explain threats clearly, show evidence of attacks stopped, and highlight benefits to incident detection & management, using the reports and dashboards from the Deception Director.</li>\r\n<li>Focus on counterintelligence as a tactical solution. Not only can you detect and research your attackers once they have penetrated your systems but you can use deception operations (DecOps) to actively disrupt them in real-time and further protect your organisation.</li>\r\n</ol>","shortDescription":"Cyber Deception Platform - detect targeted attacks with a real-time active response that automates counterintelligence campaigns.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":15,"sellingCount":10,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"CounterCraft Cyber Deception Platform","keywords":"","description":"<p>Cyber Deception Platform - detect targeted attacks with a real-time active response that automates counterintelligence campaigns.</p>\r\n<p>We have developed a distributed Deception Platform that protects large enterprises by fooling their adversaries with de","og:title":"CounterCraft Cyber Deception Platform","og:description":"<p>Cyber Deception Platform - detect targeted attacks with a real-time active response that automates counterintelligence campaigns.</p>\r\n<p>We have developed a distributed Deception Platform that protects large enterprises by fooling their adversaries with de","og:image":"https://old.roi4cio.com/fileadmin/user_upload/CounterCraft__logo_.jpg"},"eventUrl":"","translationId":2201,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":199,"title":"Deception Techniques and Honeypots","alias":"deception-techniques-and-honeypots","description":"Deception technology is an emerging category of cyber security defense. Deception technology products can detect, analyze and defend against zero-day and advanced attacks, often in real time. They are automated, accurate and provide insight into malicious activity within internal networks, which may be unseen by other types of cyber defense. Deception technology enables a more proactive security posture by seeking to deceive the attackers, detect them and then defeat them, allowing the enterprise to return to normal operations.\r\nDeception technology automates the creation of traps (decoys) and/or lures, which are mixed among and within existing IT resources to provide a layer of protection to stop attackers that have penetrated the network. Traps (decoys) are IT assets that either use real licensed operating system software, or are emulations of these devices.\r\nTraps (decoys) which use emulations can also imitate medical devices, automated teller machines (ATMs), retail point of sale systems, switches, routers and much more. Lures are generally real information technology resources (files of varying kinds) which are placed on actual IT assets.\r\nUpon penetrating the network, attackers seek to establish a backdoor and then use this to identify and exfiltrate data and intellectual property. They begin moving laterally through the internal VLANs and almost immediately will "look at" one of the traps (decoys). Interacting with one of these "decoys" will trigger an alert. These alerts are very high probability and almost always coincide to an ongoing attack. The deception is designed to lure the attacker in – the attacker may consider this a worthy asset and continue by injecting malware. Deception technology generally allows for automated static and dynamic analysis of this injected malware and provides these reports through automation to the security operations personnel. Deception technology may also identify, through indicators of compromise (IOC), suspect end-points that are part of the compromise cycle. Automation also allows for an automated memory analysis of the suspect end-point, and then automatically isolates the suspect end-point. Many partner integrations allow for a variety of implementation paths for existing enterprise and government customers.\r\nInternet of things (IoT) devices are not usually scanned by legacy defense in depth cyber defense and remain prime targets for attackers within the network. Deception technology can identify attackers moving laterally into the network from within these devices.\r\nIntegrated turnkey devices that utilize embedded operating systems, but do not allow these operating systems to be scanned or closely protected by embedded end-point or intrusion detection software are also well protected by a deception technology deployment in the same network. Examples include process control systems (SCADA) used in many manufacturing applications on a global basis. Deception technology has been associated with the discovery of Zombie Zero, an attack vector wherein deception technology identified an attacker utilizing malware embedded in barcode readers which were manufactured overseas.\r\nMedical devices are particular vulnerable to cyber attacks within the healthcare networks. As FDA-certified devices they are closed systems and not accessible to standard cyber defense software. Deception technology can surround and protect these devices and identify attackers using these for backdoor placement and data exfiltration. Recently documented cyber attacks on medical devices include x-ray machines, CT scanners, MRI scanners, blood gas analyzers, PACS systems and many more. Networks utilizing these devices can be protected by deception technology. This attack vector, called medical device hijack or medjack, is estimated to have penetrated many hospitals worldwide.\r\nSpecialized deception technology products are now capable of addressing the rise in ransomware. Select products can deceive ransomware into engaging in an attack on a decoy resource, while isolating the infection points and alerting the cyber defense software team.","materialsDescription":"<span style=\"font-weight: bold;\">Why Use Deception Technology?</span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Early Post-Breach Detection</span></span>\r\nNo security solution can stop all attacks from occurring on a network, but deception technology helps to give attackers a false sense of security by making them believe they have gained a foothold in your network. From here you can monitor and record their behavior, secure in the knowledge that they can do no damage to your decoy systems. The information you record about attacker behavior and techniques can be used to further secure your network from attack.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Reduced False Positives and Risk</span></span>\r\nDead ends, false positives and alert fatigue can all hamper security efforts and put a drain on resources, if they are even analyzed at all. Too much noise can result in IT teams becoming complacent and ignoring what could potentially be a legitimate threat. Deception technology reduces the noise with fewer false positives and high fidelity alerts packed full of useful data.\r\nDeception technology is also a low risk as it has no risk to data or impact on resources or operations. When a hacker accesses or attempts to use part of the deception layer, a real and accurate alert is generated that tells admins they need to take action.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Scale and Automate at Will</span></span>\r\nWhile the threat to corporate networks and data is a daily growing concern, security teams rarely get an increase in their budget to handle the deluge of new threats. For this reason, deception technology can be a very welcome solution. Automated alerts eliminate the need for manual effort and intervention while the design of the technology allows it to be scaled easily as the organization and threat level grows.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">From Legacy to IoT</span></span>\r\nDeception technology can be used to provide breadcrumbs for a vast range of different devices, including legacy environments, industry-specific environments and even IoT devices.<br /><br />"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[],"valuesByTemplateId":{"28":{"409":{"id":5769,"characteristicId":409,"templateId":28,"value":"N/A"},"411":{"id":5770,"characteristicId":411,"templateId":28,"value":"N/A"},"413":{"id":5773,"characteristicId":413,"templateId":28,"value":"N/A"},"415":{"id":5775,"characteristicId":415,"templateId":28,"value":"N/A"},"417":{"id":5776,"characteristicId":417,"templateId":28,"value":true},"419":{"id":5777,"characteristicId":419,"templateId":28,"value":"N/A"},"421":{"id":5778,"characteristicId":421,"templateId":28,"value":"N/A"},"423":{"id":5782,"characteristicId":423,"templateId":28,"value":true},"425":{"id":5783,"characteristicId":425,"templateId":28,"value":"N/A"},"427":{"id":5784,"characteristicId":427,"templateId":28,"value":"N/A"},"429":{"id":5787,"characteristicId":429,"templateId":28,"value":"N/A"},"431":{"id":5788,"characteristicId":431,"templateId":28,"value":"N/A"},"433":{"id":5789,"characteristicId":433,"templateId":28,"value":"N/A"},"435":{"id":5790,"characteristicId":435,"templateId":28,"value":"N/A"},"437":{"id":5791,"characteristicId":437,"templateId":28,"value":"AWS, Azure, OpenStack"},"672":{"id":5793,"characteristicId":672,"templateId":28,"value":true},"674":{"id":5794,"characteristicId":674,"templateId":28,"value":"N/A"},"676":{"id":5795,"characteristicId":676,"templateId":28,"value":"N/A"},"678":{"id":5796,"characteristicId":678,"templateId":28,"value":"N/A"},"1182":{"id":5768,"characteristicId":1182,"templateId":28,"value":"Windows"},"1184":{"id":5771,"characteristicId":1184,"templateId":28,"value":"Active reconnaissance, Lateral movement"},"1186":{"id":5772,"characteristicId":1186,"templateId":28,"value":"N/A"},"1188":{"id":5774,"characteristicId":1188,"templateId":28,"value":"N/A"},"1190":{"id":5779,"characteristicId":1190,"templateId":28,"value":"N/A"},"1192":{"id":5780,"characteristicId":1192,"templateId":28,"value":true},"1194":{"id":5781,"characteristicId":1194,"templateId":28,"value":true},"1196":{"id":5785,"characteristicId":1196,"templateId":28,"value":"N/A"},"1198":{"id":5786,"characteristicId":1198,"templateId":28,"value":"N/A"},"1200":{"id":5792,"characteristicId":1200,"templateId":28,"value":"N/A"},"1202":{"id":5797,"characteristicId":1202,"templateId":28,"value":true},"2833":{"id":7883,"characteristicId":2833,"templateId":28,"value":"N/A"},"2835":{"id":7880,"characteristicId":2835,"templateId":28,"value":true},"2837":{"id":7881,"characteristicId":2837,"templateId":28,"value":"N/A"},"2839":{"id":7882,"characteristicId":2839,"templateId":28,"value":"N/A"}}}},{"id":1640,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/CyberTrap.png","logo":true,"schemeURL":"https://old.roi4cio.com/fileadmin/user_upload/cybertrap_scheme.png","scheme":true,"title":"CyberTrap","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"alias":"cybertrap","companyTypes":[],"description":"\r\n\r\n<p>Our deception technology is designed with one purpose in mind – to stop attackers from breaching your system and causing damage. Our local threat intelligence feeds help to keep attackers out of your network. CyberTrap offers comfortable, stress-free 24/7 protection while gathering vital intelligence on attacker activities and intent.</p>\r\n\r\n\r\n<ul>\r\n<li>Local threat intelligence feeds</li>\r\n<li>Insight on attacker activities</li>\r\n<li>No false positives</li>\r\n</ul>\r\n\r\n\r\n<p><span style=\"font-weight: bold;\">Managed services</span></p>\r\n\r\n\r\n<p>Our deception as a managed service has been previously accessible only to large companies. For the first time midsize companies can benefit from deception security in a convenient subscription model that won’t stretch their budget or resources.</p>\r\n\r\n\r\n<ul>\r\n<li>No capital investment</li>\r\n<li>No need to hire experts</li>\r\n<li>No overhead costs</li>\r\n</ul>\r\n\r\n\r\n<p><span style=\"font-weight: bold;\">Supported services</span></p>\r\n\r\n\r\n<p>Large enterprises and government agencies are vulnerable to persistent attacks. Such organizations usually have an internal security team which can be supported by CyberTrap. We provide training and assistance to help kickstart your deception operation.</p>\r\n\r\n\r\n<ul>\r\n<li>Easy integration with existing security stack</li>\r\n<li>All the necessary training provided</li>\r\n<li>Fast and reliable customer support</li>\r\n</ul>\r\n\r\n\r\n<p><span style=\"font-weight: bold;\">CyberTrap is the solution for your Company</span></p>\r\n\r\n\r\n<p>Implementing an extra layer of deception security is the right move for any organization storing valuable, highly sensitive data which hackers desire.</p>\r\n\r\n\r\n<ul>\r\n<li>Government & law enforcement agencies</li>\r\n<li>Banking, financial services & insurance (BFSI)</li>\r\n<li>IT, telecom & technology</li>\r\n<li>Utilities & and national critical infrastructure (CNI)</li>\r\n<li>Production plants & manufacturing</li>\r\n<li>E-commerce & retail chains</li>\r\n<li>Healthcare companies</li>\r\n</ul>\r\n\r\n\r\n\r\n<p> </p>\r\n","shortDescription":"CyberTrap is a deception technology designed with one purpose in mind – to stop attackers from breaching your system and causing damage. ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":14,"sellingCount":4,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"CyberTrap","keywords":"","description":"\r\n\r\n<p>Our deception technology is designed with one purpose in mind – to stop attackers from breaching your system and causing damage. Our local threat intelligence feeds help to keep attackers out of your network. CyberTrap offers comfortable, stress-f","og:title":"CyberTrap","og:description":"\r\n\r\n<p>Our deception technology is designed with one purpose in mind – to stop attackers from breaching your system and causing damage. Our local threat intelligence feeds help to keep attackers out of your network. CyberTrap offers comfortable, stress-f","og:image":"https://old.roi4cio.com/fileadmin/user_upload/CyberTrap.png"},"eventUrl":"","translationId":1641,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":199,"title":"Deception Techniques and Honeypots","alias":"deception-techniques-and-honeypots","description":"Deception technology is an emerging category of cyber security defense. Deception technology products can detect, analyze and defend against zero-day and advanced attacks, often in real time. They are automated, accurate and provide insight into malicious activity within internal networks, which may be unseen by other types of cyber defense. Deception technology enables a more proactive security posture by seeking to deceive the attackers, detect them and then defeat them, allowing the enterprise to return to normal operations.\r\nDeception technology automates the creation of traps (decoys) and/or lures, which are mixed among and within existing IT resources to provide a layer of protection to stop attackers that have penetrated the network. Traps (decoys) are IT assets that either use real licensed operating system software, or are emulations of these devices.\r\nTraps (decoys) which use emulations can also imitate medical devices, automated teller machines (ATMs), retail point of sale systems, switches, routers and much more. Lures are generally real information technology resources (files of varying kinds) which are placed on actual IT assets.\r\nUpon penetrating the network, attackers seek to establish a backdoor and then use this to identify and exfiltrate data and intellectual property. They begin moving laterally through the internal VLANs and almost immediately will "look at" one of the traps (decoys). Interacting with one of these "decoys" will trigger an alert. These alerts are very high probability and almost always coincide to an ongoing attack. The deception is designed to lure the attacker in – the attacker may consider this a worthy asset and continue by injecting malware. Deception technology generally allows for automated static and dynamic analysis of this injected malware and provides these reports through automation to the security operations personnel. Deception technology may also identify, through indicators of compromise (IOC), suspect end-points that are part of the compromise cycle. Automation also allows for an automated memory analysis of the suspect end-point, and then automatically isolates the suspect end-point. Many partner integrations allow for a variety of implementation paths for existing enterprise and government customers.\r\nInternet of things (IoT) devices are not usually scanned by legacy defense in depth cyber defense and remain prime targets for attackers within the network. Deception technology can identify attackers moving laterally into the network from within these devices.\r\nIntegrated turnkey devices that utilize embedded operating systems, but do not allow these operating systems to be scanned or closely protected by embedded end-point or intrusion detection software are also well protected by a deception technology deployment in the same network. Examples include process control systems (SCADA) used in many manufacturing applications on a global basis. Deception technology has been associated with the discovery of Zombie Zero, an attack vector wherein deception technology identified an attacker utilizing malware embedded in barcode readers which were manufactured overseas.\r\nMedical devices are particular vulnerable to cyber attacks within the healthcare networks. As FDA-certified devices they are closed systems and not accessible to standard cyber defense software. Deception technology can surround and protect these devices and identify attackers using these for backdoor placement and data exfiltration. Recently documented cyber attacks on medical devices include x-ray machines, CT scanners, MRI scanners, blood gas analyzers, PACS systems and many more. Networks utilizing these devices can be protected by deception technology. This attack vector, called medical device hijack or medjack, is estimated to have penetrated many hospitals worldwide.\r\nSpecialized deception technology products are now capable of addressing the rise in ransomware. Select products can deceive ransomware into engaging in an attack on a decoy resource, while isolating the infection points and alerting the cyber defense software team.","materialsDescription":"<span style=\"font-weight: bold;\">Why Use Deception Technology?</span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Early Post-Breach Detection</span></span>\r\nNo security solution can stop all attacks from occurring on a network, but deception technology helps to give attackers a false sense of security by making them believe they have gained a foothold in your network. From here you can monitor and record their behavior, secure in the knowledge that they can do no damage to your decoy systems. The information you record about attacker behavior and techniques can be used to further secure your network from attack.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Reduced False Positives and Risk</span></span>\r\nDead ends, false positives and alert fatigue can all hamper security efforts and put a drain on resources, if they are even analyzed at all. Too much noise can result in IT teams becoming complacent and ignoring what could potentially be a legitimate threat. Deception technology reduces the noise with fewer false positives and high fidelity alerts packed full of useful data.\r\nDeception technology is also a low risk as it has no risk to data or impact on resources or operations. When a hacker accesses or attempts to use part of the deception layer, a real and accurate alert is generated that tells admins they need to take action.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Scale and Automate at Will</span></span>\r\nWhile the threat to corporate networks and data is a daily growing concern, security teams rarely get an increase in their budget to handle the deluge of new threats. For this reason, deception technology can be a very welcome solution. Automated alerts eliminate the need for manual effort and intervention while the design of the technology allows it to be scaled easily as the organization and threat level grows.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">From Legacy to IoT</span></span>\r\nDeception technology can be used to provide breadcrumbs for a vast range of different devices, including legacy environments, industry-specific environments and even IoT devices.<br /><br />"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[],"valuesByTemplateId":{"28":{"409":{"id":1399,"characteristicId":409,"templateId":28,"value":true},"411":{"id":1400,"characteristicId":411,"templateId":28,"value":"N/A"},"413":{"id":1401,"characteristicId":413,"templateId":28,"value":"N/A"},"415":{"id":1402,"characteristicId":415,"templateId":28,"value":"N/A"},"417":{"id":1403,"characteristicId":417,"templateId":28,"value":true},"419":{"id":1404,"characteristicId":419,"templateId":28,"value":"N/A"},"421":{"id":1405,"characteristicId":421,"templateId":28,"value":"N/A"},"423":{"id":1406,"characteristicId":423,"templateId":28,"value":"N/A"},"425":{"id":1407,"characteristicId":425,"templateId":28,"value":"N/A"},"427":{"id":1408,"characteristicId":427,"templateId":28,"value":"N/A"},"429":{"id":1409,"characteristicId":429,"templateId":28,"value":"N/A"},"431":{"id":1410,"characteristicId":431,"templateId":28,"value":"N/A"},"433":{"id":1411,"characteristicId":433,"templateId":28,"value":"N/A"},"435":{"id":1412,"characteristicId":435,"templateId":28,"value":"N/A"},"437":{"id":1413,"characteristicId":437,"templateId":28,"value":"SaaS available"},"672":{"id":5633,"characteristicId":672,"templateId":28,"value":"N/A"},"674":{"id":5634,"characteristicId":674,"templateId":28,"value":"N/A"},"676":{"id":5635,"characteristicId":676,"templateId":28,"value":"N/A"},"678":{"id":5636,"characteristicId":678,"templateId":28,"value":"N/A"},"1182":{"id":5623,"characteristicId":1182,"templateId":28,"value":"Windows"},"1184":{"id":5624,"characteristicId":1184,"templateId":28,"value":"Active reconnaissance, Lateral movement, Exfiltration"},"1186":{"id":5625,"characteristicId":1186,"templateId":28,"value":"N/A"},"1188":{"id":5626,"characteristicId":1188,"templateId":28,"value":"N/A"},"1190":{"id":5627,"characteristicId":1190,"templateId":28,"value":"N/A"},"1192":{"id":5628,"characteristicId":1192,"templateId":28,"value":"N/A"},"1194":{"id":5629,"characteristicId":1194,"templateId":28,"value":"N/A"},"1196":{"id":5630,"characteristicId":1196,"templateId":28,"value":true},"1198":{"id":5631,"characteristicId":1198,"templateId":28,"value":"N/A"},"1200":{"id":5632,"characteristicId":1200,"templateId":28,"value":"N/A"},"1202":{"id":5637,"characteristicId":1202,"templateId":28,"value":"N/A"},"2833":{"id":7851,"characteristicId":2833,"templateId":28,"value":"N/A"},"2835":{"id":7848,"characteristicId":2835,"templateId":28,"value":true},"2837":{"id":7849,"characteristicId":2837,"templateId":28,"value":true},"2839":{"id":7850,"characteristicId":2839,"templateId":28,"value":true}}}},{"id":1646,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Cymmetria.png","logo":true,"scheme":false,"title":"Cymmetria’s MazeRunner","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"alias":"cymmetrias-mazerunner","companyTypes":[],"description":"<p><strong>What Is Cyber Deception? </strong></p>\r\n<p>Cyber deception leverages the fact that attackers always follow a predictable attack pattern: reconnaissance, lateral movement, and exploitation. When attackers use tools like Responder.py (for Pass-the-Hash attacks) while targeting sensitive business processes and assets (e.g., SWIFT), deception technology creates a controlled path for them to follow. Attackers are diverted from organizational assets and into controlled environments, giving defenders the upper hand in detection, investigation, and mitigation.</p>\r\n<p><strong>How MazeRunner Works </strong></p>\r\n<p>MazeRunner gives organizations a solution for creating effective deception stories. Deception stories, which are comprised of breadcrumbs and decoys, lead attackers to believe that they have successfully gained access to a target machine. Breadcrumbs are data elements (such as credentials) that lead attackers to decoys. Decoys are machines that run live services; when they are attacked, MazeRunner raises an alert and gathers forensic data.</p>\r\n<p><strong>Cymmetria Features </strong></p>\r\n<ul>\r\n<li><strong>Git </strong>- Source-code management for Linux decoys</li>\r\n<li><strong>MySQL</strong>- Database service for Linux decoys</li>\r\n<li><strong>Network Monitor </strong>- Monitors for unrecognized machines in the network</li>\r\n<li><strong>OpenVPN </strong>- Virtual private network (VPN) service for Linux decoys</li>\r\n<li><strong>RDP </strong>- Remote Desktop service for Windows decoys</li>\r\n<li><strong>Responder </strong>- This service can, in addition to connecting to the network breadcrumb, monitor for attackers performing NBNS spoofing and Responder usage directly from the decoy. The username, domain, and password will be fed to the attacker from the decoy. Activating MazeRunner’s Pass-the-Hash Monitor (ActiveSOC > Pass-the-Hash Monitor) allows raising alerts when stolen credentials are used in the network</li>\r\n<li><strong>SMB </strong>- Creates a shared folder on the decoy. For Windows and Linux decoys</li>\r\n<li><strong>SSH </strong>- Remote shell service for Linux decoys</li>\r\n<li><strong>Web application </strong>- Allows running a custom, user-controlled website, or a built-in HTTP server with a pre-set web application such as MediaWiki, SugarCRM, or phpMyAdmin. For Linux decoys</li>\r\n</ul>","shortDescription":"Cymmetria’s MazeRunner platform lets you dominate an attacker’s movements from the very beginning and lead them to a monitored deception network.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":14,"sellingCount":14,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Cymmetria’s MazeRunner","keywords":"","description":"<p><strong>What Is Cyber Deception? </strong></p>\r\n<p>Cyber deception leverages the fact that attackers always follow a predictable attack pattern: reconnaissance, lateral movement, and exploitation. When attackers use tools like Responder.py (for Pass-the-Has","og:title":"Cymmetria’s MazeRunner","og:description":"<p><strong>What Is Cyber Deception? </strong></p>\r\n<p>Cyber deception leverages the fact that attackers always follow a predictable attack pattern: reconnaissance, lateral movement, and exploitation. When attackers use tools like Responder.py (for Pass-the-Has","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Cymmetria.png"},"eventUrl":"","translationId":1647,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":199,"title":"Deception Techniques and Honeypots","alias":"deception-techniques-and-honeypots","description":"Deception technology is an emerging category of cyber security defense. Deception technology products can detect, analyze and defend against zero-day and advanced attacks, often in real time. They are automated, accurate and provide insight into malicious activity within internal networks, which may be unseen by other types of cyber defense. Deception technology enables a more proactive security posture by seeking to deceive the attackers, detect them and then defeat them, allowing the enterprise to return to normal operations.\r\nDeception technology automates the creation of traps (decoys) and/or lures, which are mixed among and within existing IT resources to provide a layer of protection to stop attackers that have penetrated the network. Traps (decoys) are IT assets that either use real licensed operating system software, or are emulations of these devices.\r\nTraps (decoys) which use emulations can also imitate medical devices, automated teller machines (ATMs), retail point of sale systems, switches, routers and much more. Lures are generally real information technology resources (files of varying kinds) which are placed on actual IT assets.\r\nUpon penetrating the network, attackers seek to establish a backdoor and then use this to identify and exfiltrate data and intellectual property. They begin moving laterally through the internal VLANs and almost immediately will "look at" one of the traps (decoys). Interacting with one of these "decoys" will trigger an alert. These alerts are very high probability and almost always coincide to an ongoing attack. The deception is designed to lure the attacker in – the attacker may consider this a worthy asset and continue by injecting malware. Deception technology generally allows for automated static and dynamic analysis of this injected malware and provides these reports through automation to the security operations personnel. Deception technology may also identify, through indicators of compromise (IOC), suspect end-points that are part of the compromise cycle. Automation also allows for an automated memory analysis of the suspect end-point, and then automatically isolates the suspect end-point. Many partner integrations allow for a variety of implementation paths for existing enterprise and government customers.\r\nInternet of things (IoT) devices are not usually scanned by legacy defense in depth cyber defense and remain prime targets for attackers within the network. Deception technology can identify attackers moving laterally into the network from within these devices.\r\nIntegrated turnkey devices that utilize embedded operating systems, but do not allow these operating systems to be scanned or closely protected by embedded end-point or intrusion detection software are also well protected by a deception technology deployment in the same network. Examples include process control systems (SCADA) used in many manufacturing applications on a global basis. Deception technology has been associated with the discovery of Zombie Zero, an attack vector wherein deception technology identified an attacker utilizing malware embedded in barcode readers which were manufactured overseas.\r\nMedical devices are particular vulnerable to cyber attacks within the healthcare networks. As FDA-certified devices they are closed systems and not accessible to standard cyber defense software. Deception technology can surround and protect these devices and identify attackers using these for backdoor placement and data exfiltration. Recently documented cyber attacks on medical devices include x-ray machines, CT scanners, MRI scanners, blood gas analyzers, PACS systems and many more. Networks utilizing these devices can be protected by deception technology. This attack vector, called medical device hijack or medjack, is estimated to have penetrated many hospitals worldwide.\r\nSpecialized deception technology products are now capable of addressing the rise in ransomware. Select products can deceive ransomware into engaging in an attack on a decoy resource, while isolating the infection points and alerting the cyber defense software team.","materialsDescription":"<span style=\"font-weight: bold;\">Why Use Deception Technology?</span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Early Post-Breach Detection</span></span>\r\nNo security solution can stop all attacks from occurring on a network, but deception technology helps to give attackers a false sense of security by making them believe they have gained a foothold in your network. From here you can monitor and record their behavior, secure in the knowledge that they can do no damage to your decoy systems. The information you record about attacker behavior and techniques can be used to further secure your network from attack.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Reduced False Positives and Risk</span></span>\r\nDead ends, false positives and alert fatigue can all hamper security efforts and put a drain on resources, if they are even analyzed at all. Too much noise can result in IT teams becoming complacent and ignoring what could potentially be a legitimate threat. Deception technology reduces the noise with fewer false positives and high fidelity alerts packed full of useful data.\r\nDeception technology is also a low risk as it has no risk to data or impact on resources or operations. When a hacker accesses or attempts to use part of the deception layer, a real and accurate alert is generated that tells admins they need to take action.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Scale and Automate at Will</span></span>\r\nWhile the threat to corporate networks and data is a daily growing concern, security teams rarely get an increase in their budget to handle the deluge of new threats. For this reason, deception technology can be a very welcome solution. Automated alerts eliminate the need for manual effort and intervention while the design of the technology allows it to be scaled easily as the organization and threat level grows.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">From Legacy to IoT</span></span>\r\nDeception technology can be used to provide breadcrumbs for a vast range of different devices, including legacy environments, industry-specific environments and even IoT devices.<br /><br />"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[],"valuesByTemplateId":{"28":{"409":{"id":1417,"characteristicId":409,"templateId":28,"value":"N/A"},"411":{"id":1418,"characteristicId":411,"templateId":28,"value":"N/A"},"413":{"id":1419,"characteristicId":413,"templateId":28,"value":"N/A"},"415":{"id":1420,"characteristicId":415,"templateId":28,"value":"N/A"},"417":{"id":1421,"characteristicId":417,"templateId":28,"value":true},"419":{"id":1422,"characteristicId":419,"templateId":28,"value":"N/A"},"421":{"id":1423,"characteristicId":421,"templateId":28,"value":"N/A"},"423":{"id":1424,"characteristicId":423,"templateId":28,"value":true},"425":{"id":1425,"characteristicId":425,"templateId":28,"value":"N/A"},"427":{"id":1426,"characteristicId":427,"templateId":28,"value":"N/A"},"429":{"id":1427,"characteristicId":429,"templateId":28,"value":"N/A"},"431":{"id":1428,"characteristicId":431,"templateId":28,"value":"N/A"},"433":{"id":1429,"characteristicId":433,"templateId":28,"value":"N/A"},"435":{"id":1430,"characteristicId":435,"templateId":28,"value":true},"437":{"id":1431,"characteristicId":437,"templateId":28,"value":"Yes"},"672":{"id":2519,"characteristicId":672,"templateId":28,"value":"N/A"},"674":{"id":2520,"characteristicId":674,"templateId":28,"value":"N/A"},"676":{"id":2521,"characteristicId":676,"templateId":28,"value":"N/A"},"678":{"id":2522,"characteristicId":678,"templateId":28,"value":"N/A"},"1182":{"id":5638,"characteristicId":1182,"templateId":28,"value":"Windows"},"1184":{"id":5639,"characteristicId":1184,"templateId":28,"value":"Active reconnaissance, Lateral movement, Exfiltration"},"1186":{"id":5640,"characteristicId":1186,"templateId":28,"value":true},"1188":{"id":5641,"characteristicId":1188,"templateId":28,"value":"N/A"},"1190":{"id":5642,"characteristicId":1190,"templateId":28,"value":"N/A"},"1192":{"id":5643,"characteristicId":1192,"templateId":28,"value":"N/A"},"1194":{"id":5644,"characteristicId":1194,"templateId":28,"value":"N/A"},"1196":{"id":5645,"characteristicId":1196,"templateId":28,"value":true},"1198":{"id":5646,"characteristicId":1198,"templateId":28,"value":"N/A"},"1200":{"id":5647,"characteristicId":1200,"templateId":28,"value":"N/A"},"1202":{"id":5648,"characteristicId":1202,"templateId":28,"value":"N/A"},"2833":{"id":7855,"characteristicId":2833,"templateId":28,"value":"N/A"},"2835":{"id":7852,"characteristicId":2835,"templateId":28,"value":"N/A"},"2837":{"id":7853,"characteristicId":2837,"templateId":28,"value":"N/A"},"2839":{"id":7854,"characteristicId":2839,"templateId":28,"value":"N/A"}}}},{"id":1654,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/FIDELIS.PNG","logo":true,"scheme":false,"title":"Fidelis Elevate","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"alias":"fidelis-elevate","companyTypes":[],"description":"\r\n<p>Fidelis Elevate™</p>\r\n<ul>\r\n<li>Automate Detection</li>\r\n<li>Automate Response</li>\r\n<li>Prevent Data Theft</li>\r\n</ul>\r\n<p><span style=\"font-weight: bold;\">Elevate Security Operations</span></p>\r\n\r\n\r\n<p>Even with many prevention tools in place, organizations are still getting breached. That's why more organizations are shifting from a prevention-focused approach to a detection and response strategy. Fidelis Elevate is the only security operations platform that provides deep visibility, threat intelligence and context across complex environments to automate detection and response.</p>\r\n\r\n\r\n<p><span style=\"font-weight: bold;\">A Force Multiplier for Your Security Operations</span></p>\r\n\r\n\r\n<p>Fidelis Elevate™ integrates network visibility, data loss prevention, deception, and endpoint detection and response into one unified solution. Now your security team can focus on the most urgent threats and protect sensitive data rather than spending time validating and triaging thousands of alerts.</p>\r\n\r\n\r\n<p><span style=\"font-weight: bold;\">Enhance Your Visibility and Detection </span><span style=\"font-weight: bold;\">Capabilities</span></p>\r\n\r\n\r\n<ul>\r\n<li>Enrich alerts with data and context from Fidelis Network®, Fidelis Endpoint®, and Fidelis Deception™ – all in a unified platform</li>\r\n<li>Combine threat intelligence, sandboxing, machine learning, deception, and Fidelis research</li>\r\n<li>Capture and store metadata for analysis and threat hunting</li>\r\n</ul>\r\n<p><span style=\"font-weight: bold;\">Automate Response for Quick and Effective Resolution</span></p>\r\n<ul>\r\n<li>Draw conclusions with accuracy by automatically collapsing many alerts and events into a single view</li>\r\n<li>Automatically validate network alerts on the endpoint with certainty</li>\r\n<li>Raise the priority level when evidence is found of increased risk</li>\r\n<li>Automatically execute a response playbook to jumpstart your investigation with clarity</li>\r\n<li>Stop data leakage, command and control, and active attacks</li>\r\n</ul>\r\n<p><span style=\"font-weight: bold;\">Ensure Best-of-Breed Breach Detection and Network DLP</span></p>\r\n\r\n\r\n<p>Fidelis Network® provides deep visibility – across sessions, packets, and content – and automatically validates, correlates, and consolidates network alerts against every endpoint in your network for fast response.</p>\r\n\r\n\r\n<p><span style=\"font-weight: bold;\">Automate Endpoint Detection and Response</span></p>\r\n\r\n\r\n<p>Fidelis Endpoint® increases endpoint visibility, reduces response time from hours to minutes and enhances endpoint protection.</p>\r\n\r\n\r\n<p><span style=\"font-weight: bold;\">Detect Post-Breach Attacks With an Active Deception Defense</span></p>\r\n\r\n\r\n<p>Fidelis Deception™ automatically profiles networks and assets to create deception layers that are as realistic as possible to detect post-breach attacks.</p>\r\n\r\n\r\n<p><span style=\"font-weight: bold;\">Fidelis Network Module</span></p>\r\n\r\n\r\n<p>Leverage Curated Threat Intelligence for More Accurate Detection Fidelis Insight™ analyzes real-time and historical data, so you can rapidly detect and respond to threats in your environment, even when they happened in the past.</p>\r\n","shortDescription":"Fidelis Elevate is one unified platform ensures faster detection and automated response – providing accuracy, clarity and certainty for your cyber security team.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":5,"sellingCount":1,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Fidelis Elevate","keywords":"","description":"\r\n<p>Fidelis Elevate™</p>\r\n<ul>\r\n<li>Automate Detection</li>\r\n<li>Automate Response</li>\r\n<li>Prevent Data Theft</li>\r\n</ul>\r\n<p><span style=\"font-weight: bold;\">Elevate Security Operations</span></p>\r\n\r\n\r\n<p>Even with many prevention tools in place, org","og:title":"Fidelis Elevate","og:description":"\r\n<p>Fidelis Elevate™</p>\r\n<ul>\r\n<li>Automate Detection</li>\r\n<li>Automate Response</li>\r\n<li>Prevent Data Theft</li>\r\n</ul>\r\n<p><span style=\"font-weight: bold;\">Elevate Security Operations</span></p>\r\n\r\n\r\n<p>Even with many prevention tools in place, org","og:image":"https://old.roi4cio.com/fileadmin/user_upload/FIDELIS.PNG"},"eventUrl":"","translationId":1655,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":199,"title":"Deception Techniques and Honeypots","alias":"deception-techniques-and-honeypots","description":"Deception technology is an emerging category of cyber security defense. Deception technology products can detect, analyze and defend against zero-day and advanced attacks, often in real time. They are automated, accurate and provide insight into malicious activity within internal networks, which may be unseen by other types of cyber defense. Deception technology enables a more proactive security posture by seeking to deceive the attackers, detect them and then defeat them, allowing the enterprise to return to normal operations.\r\nDeception technology automates the creation of traps (decoys) and/or lures, which are mixed among and within existing IT resources to provide a layer of protection to stop attackers that have penetrated the network. Traps (decoys) are IT assets that either use real licensed operating system software, or are emulations of these devices.\r\nTraps (decoys) which use emulations can also imitate medical devices, automated teller machines (ATMs), retail point of sale systems, switches, routers and much more. Lures are generally real information technology resources (files of varying kinds) which are placed on actual IT assets.\r\nUpon penetrating the network, attackers seek to establish a backdoor and then use this to identify and exfiltrate data and intellectual property. They begin moving laterally through the internal VLANs and almost immediately will "look at" one of the traps (decoys). Interacting with one of these "decoys" will trigger an alert. These alerts are very high probability and almost always coincide to an ongoing attack. The deception is designed to lure the attacker in – the attacker may consider this a worthy asset and continue by injecting malware. Deception technology generally allows for automated static and dynamic analysis of this injected malware and provides these reports through automation to the security operations personnel. Deception technology may also identify, through indicators of compromise (IOC), suspect end-points that are part of the compromise cycle. Automation also allows for an automated memory analysis of the suspect end-point, and then automatically isolates the suspect end-point. Many partner integrations allow for a variety of implementation paths for existing enterprise and government customers.\r\nInternet of things (IoT) devices are not usually scanned by legacy defense in depth cyber defense and remain prime targets for attackers within the network. Deception technology can identify attackers moving laterally into the network from within these devices.\r\nIntegrated turnkey devices that utilize embedded operating systems, but do not allow these operating systems to be scanned or closely protected by embedded end-point or intrusion detection software are also well protected by a deception technology deployment in the same network. Examples include process control systems (SCADA) used in many manufacturing applications on a global basis. Deception technology has been associated with the discovery of Zombie Zero, an attack vector wherein deception technology identified an attacker utilizing malware embedded in barcode readers which were manufactured overseas.\r\nMedical devices are particular vulnerable to cyber attacks within the healthcare networks. As FDA-certified devices they are closed systems and not accessible to standard cyber defense software. Deception technology can surround and protect these devices and identify attackers using these for backdoor placement and data exfiltration. Recently documented cyber attacks on medical devices include x-ray machines, CT scanners, MRI scanners, blood gas analyzers, PACS systems and many more. Networks utilizing these devices can be protected by deception technology. This attack vector, called medical device hijack or medjack, is estimated to have penetrated many hospitals worldwide.\r\nSpecialized deception technology products are now capable of addressing the rise in ransomware. Select products can deceive ransomware into engaging in an attack on a decoy resource, while isolating the infection points and alerting the cyber defense software team.","materialsDescription":"<span style=\"font-weight: bold;\">Why Use Deception Technology?</span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Early Post-Breach Detection</span></span>\r\nNo security solution can stop all attacks from occurring on a network, but deception technology helps to give attackers a false sense of security by making them believe they have gained a foothold in your network. From here you can monitor and record their behavior, secure in the knowledge that they can do no damage to your decoy systems. The information you record about attacker behavior and techniques can be used to further secure your network from attack.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Reduced False Positives and Risk</span></span>\r\nDead ends, false positives and alert fatigue can all hamper security efforts and put a drain on resources, if they are even analyzed at all. Too much noise can result in IT teams becoming complacent and ignoring what could potentially be a legitimate threat. Deception technology reduces the noise with fewer false positives and high fidelity alerts packed full of useful data.\r\nDeception technology is also a low risk as it has no risk to data or impact on resources or operations. When a hacker accesses or attempts to use part of the deception layer, a real and accurate alert is generated that tells admins they need to take action.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Scale and Automate at Will</span></span>\r\nWhile the threat to corporate networks and data is a daily growing concern, security teams rarely get an increase in their budget to handle the deluge of new threats. For this reason, deception technology can be a very welcome solution. Automated alerts eliminate the need for manual effort and intervention while the design of the technology allows it to be scaled easily as the organization and threat level grows.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">From Legacy to IoT</span></span>\r\nDeception technology can be used to provide breadcrumbs for a vast range of different devices, including legacy environments, industry-specific environments and even IoT devices.<br /><br />"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[],"valuesByTemplateId":{"28":{"409":{"id":1489,"characteristicId":409,"templateId":28,"value":"N/A"},"411":{"id":1490,"characteristicId":411,"templateId":28,"value":true},"413":{"id":1491,"characteristicId":413,"templateId":28,"value":true},"415":{"id":1492,"characteristicId":415,"templateId":28,"value":"N/A"},"417":{"id":1493,"characteristicId":417,"templateId":28,"value":"N/A"},"419":{"id":1494,"characteristicId":419,"templateId":28,"value":true},"421":{"id":1495,"characteristicId":421,"templateId":28,"value":true},"423":{"id":1496,"characteristicId":423,"templateId":28,"value":true},"425":{"id":1497,"characteristicId":425,"templateId":28,"value":"N/A"},"427":{"id":1498,"characteristicId":427,"templateId":28,"value":"N/A"},"429":{"id":1499,"characteristicId":429,"templateId":28,"value":"N/A"},"431":{"id":1500,"characteristicId":431,"templateId":28,"value":"N/A"},"433":{"id":1501,"characteristicId":433,"templateId":28,"value":true},"435":{"id":1502,"characteristicId":435,"templateId":28,"value":"N/A"},"437":{"id":1503,"characteristicId":437,"templateId":28,"value":"N/A"},"672":{"id":2527,"characteristicId":672,"templateId":28,"value":"N/A"},"674":{"id":2528,"characteristicId":674,"templateId":28,"value":true},"676":{"id":2529,"characteristicId":676,"templateId":28,"value":"N/A"},"678":{"id":2530,"characteristicId":678,"templateId":28,"value":"N/A"},"1182":{"id":5686,"characteristicId":1182,"templateId":28,"value":"Windows"},"1184":{"id":5687,"characteristicId":1184,"templateId":28,"value":"Active reconnaissance, Lateral movement, Exfiltration"},"1186":{"id":5688,"characteristicId":1186,"templateId":28,"value":"N/A"},"1188":{"id":5689,"characteristicId":1188,"templateId":28,"value":"N/A"},"1190":{"id":5690,"characteristicId":1190,"templateId":28,"value":"N/A"},"1192":{"id":5691,"characteristicId":1192,"templateId":28,"value":"N/A"},"1194":{"id":5692,"characteristicId":1194,"templateId":28,"value":true},"1196":{"id":5693,"characteristicId":1196,"templateId":28,"value":"N/A"},"1198":{"id":5694,"characteristicId":1198,"templateId":28,"value":"N/A"},"1200":{"id":5695,"characteristicId":1200,"templateId":28,"value":"N/A"},"1202":{"id":5696,"characteristicId":1202,"templateId":28,"value":"N/A"},"2833":{"id":7867,"characteristicId":2833,"templateId":28,"value":"N/A"},"2835":{"id":7864,"characteristicId":2835,"templateId":28,"value":"N/A"},"2837":{"id":7865,"characteristicId":2837,"templateId":28,"value":true},"2839":{"id":7866,"characteristicId":2839,"templateId":28,"value":true}}}},{"id":1648,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/GuardiCore.png","logo":true,"scheme":false,"title":"GuardiCore Centra Security Platform","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"alias":"guardicore-centra-security-platform","companyTypes":[],"description":"<span style=\"font-weight: bold;\">Reveal Application Flows Across the Infrastructure</span>\r\n<ul> <li>Automatically discover applications and flows</li> <li>Quickly understand application behavior</li> <li>Granular visibility down to the process level</li> </ul>\r\n<span style=\"font-weight: bold;\">Segment with a Powerful Policy Engine</span>\r\n<ul> <li>Define segmentation policies in minutes</li> <li>Automatic policy recommendations</li> <li>Consistent policy expression across any environment</li> </ul>\r\n<span style=\"font-weight: bold;\"><br /></span> <span style=\"font-weight: bold;\">Detect Threats Faster and Simplify Response</span>\r\n<ul> <li>Multiple detection methods cover all types of threats</li> <li>Dynamic deception immediately traps attackers</li> <li>High quality, in-context security incidents with mitigation recommendations to speed incident response</li> </ul>\r\n<span style=\"font-weight: bold;\"><br /></span> <span style=\"font-weight: bold;\">Protection For Your Entire Infrastructure, Built and Proven for Cloud Scale</span> <span style=\"font-weight: bold;\"><br /></span>\r\n<ul> <li>Hybrid Cloud. Workload protection in hybrid cloud environments that span on-premises workloads, VMs, containers and deployments in public cloud IaaS including AWS, Azure and GCP.</li> <li>Simplify Security. Simplify security management with one platform that provides flow visibility, micro-segmentation, threat detection and incident response.</li> <li>Enterprise Scalability. Scalable to meet the performance and security requirements of any sized environment</li> </ul>","shortDescription":"GuardiCore Centra Security Platform Designed to Detect Threats and Lateral Movements with Greater Visibility and Micro-Segmentation","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":5,"sellingCount":7,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"GuardiCore Centra Security Platform","keywords":"","description":"<span style=\"font-weight: bold;\">Reveal Application Flows Across the Infrastructure</span>\r\n<ul> <li>Automatically discover applications and flows</li> <li>Quickly understand application behavior</li> <li>Granular visibility down to the process level</li> </ul","og:title":"GuardiCore Centra Security Platform","og:description":"<span style=\"font-weight: bold;\">Reveal Application Flows Across the Infrastructure</span>\r\n<ul> <li>Automatically discover applications and flows</li> <li>Quickly understand application behavior</li> <li>Granular visibility down to the process level</li> </ul","og:image":"https://old.roi4cio.com/fileadmin/user_upload/GuardiCore.png"},"eventUrl":"","translationId":1649,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":199,"title":"Deception Techniques and Honeypots","alias":"deception-techniques-and-honeypots","description":"Deception technology is an emerging category of cyber security defense. Deception technology products can detect, analyze and defend against zero-day and advanced attacks, often in real time. They are automated, accurate and provide insight into malicious activity within internal networks, which may be unseen by other types of cyber defense. Deception technology enables a more proactive security posture by seeking to deceive the attackers, detect them and then defeat them, allowing the enterprise to return to normal operations.\r\nDeception technology automates the creation of traps (decoys) and/or lures, which are mixed among and within existing IT resources to provide a layer of protection to stop attackers that have penetrated the network. Traps (decoys) are IT assets that either use real licensed operating system software, or are emulations of these devices.\r\nTraps (decoys) which use emulations can also imitate medical devices, automated teller machines (ATMs), retail point of sale systems, switches, routers and much more. Lures are generally real information technology resources (files of varying kinds) which are placed on actual IT assets.\r\nUpon penetrating the network, attackers seek to establish a backdoor and then use this to identify and exfiltrate data and intellectual property. They begin moving laterally through the internal VLANs and almost immediately will "look at" one of the traps (decoys). Interacting with one of these "decoys" will trigger an alert. These alerts are very high probability and almost always coincide to an ongoing attack. The deception is designed to lure the attacker in – the attacker may consider this a worthy asset and continue by injecting malware. Deception technology generally allows for automated static and dynamic analysis of this injected malware and provides these reports through automation to the security operations personnel. Deception technology may also identify, through indicators of compromise (IOC), suspect end-points that are part of the compromise cycle. Automation also allows for an automated memory analysis of the suspect end-point, and then automatically isolates the suspect end-point. Many partner integrations allow for a variety of implementation paths for existing enterprise and government customers.\r\nInternet of things (IoT) devices are not usually scanned by legacy defense in depth cyber defense and remain prime targets for attackers within the network. Deception technology can identify attackers moving laterally into the network from within these devices.\r\nIntegrated turnkey devices that utilize embedded operating systems, but do not allow these operating systems to be scanned or closely protected by embedded end-point or intrusion detection software are also well protected by a deception technology deployment in the same network. Examples include process control systems (SCADA) used in many manufacturing applications on a global basis. Deception technology has been associated with the discovery of Zombie Zero, an attack vector wherein deception technology identified an attacker utilizing malware embedded in barcode readers which were manufactured overseas.\r\nMedical devices are particular vulnerable to cyber attacks within the healthcare networks. As FDA-certified devices they are closed systems and not accessible to standard cyber defense software. Deception technology can surround and protect these devices and identify attackers using these for backdoor placement and data exfiltration. Recently documented cyber attacks on medical devices include x-ray machines, CT scanners, MRI scanners, blood gas analyzers, PACS systems and many more. Networks utilizing these devices can be protected by deception technology. This attack vector, called medical device hijack or medjack, is estimated to have penetrated many hospitals worldwide.\r\nSpecialized deception technology products are now capable of addressing the rise in ransomware. Select products can deceive ransomware into engaging in an attack on a decoy resource, while isolating the infection points and alerting the cyber defense software team.","materialsDescription":"<span style=\"font-weight: bold;\">Why Use Deception Technology?</span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Early Post-Breach Detection</span></span>\r\nNo security solution can stop all attacks from occurring on a network, but deception technology helps to give attackers a false sense of security by making them believe they have gained a foothold in your network. From here you can monitor and record their behavior, secure in the knowledge that they can do no damage to your decoy systems. The information you record about attacker behavior and techniques can be used to further secure your network from attack.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Reduced False Positives and Risk</span></span>\r\nDead ends, false positives and alert fatigue can all hamper security efforts and put a drain on resources, if they are even analyzed at all. Too much noise can result in IT teams becoming complacent and ignoring what could potentially be a legitimate threat. Deception technology reduces the noise with fewer false positives and high fidelity alerts packed full of useful data.\r\nDeception technology is also a low risk as it has no risk to data or impact on resources or operations. When a hacker accesses or attempts to use part of the deception layer, a real and accurate alert is generated that tells admins they need to take action.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Scale and Automate at Will</span></span>\r\nWhile the threat to corporate networks and data is a daily growing concern, security teams rarely get an increase in their budget to handle the deluge of new threats. For this reason, deception technology can be a very welcome solution. Automated alerts eliminate the need for manual effort and intervention while the design of the technology allows it to be scaled easily as the organization and threat level grows.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">From Legacy to IoT</span></span>\r\nDeception technology can be used to provide breadcrumbs for a vast range of different devices, including legacy environments, industry-specific environments and even IoT devices.<br /><br />"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[],"valuesByTemplateId":{"28":{"409":{"id":1435,"characteristicId":409,"templateId":28,"value":"N/A"},"411":{"id":1436,"characteristicId":411,"templateId":28,"value":"N/A"},"413":{"id":1437,"characteristicId":413,"templateId":28,"value":"N/A"},"415":{"id":1438,"characteristicId":415,"templateId":28,"value":"N/A"},"417":{"id":1439,"characteristicId":417,"templateId":28,"value":true},"419":{"id":1440,"characteristicId":419,"templateId":28,"value":true},"421":{"id":1441,"characteristicId":421,"templateId":28,"value":"N/A"},"423":{"id":1442,"characteristicId":423,"templateId":28,"value":true},"425":{"id":1443,"characteristicId":425,"templateId":28,"value":"N/A"},"427":{"id":1444,"characteristicId":427,"templateId":28,"value":"N/A"},"429":{"id":1445,"characteristicId":429,"templateId":28,"value":"N/A"},"431":{"id":1446,"characteristicId":431,"templateId":28,"value":"N/A"},"433":{"id":1447,"characteristicId":433,"templateId":28,"value":"N/A"},"435":{"id":1448,"characteristicId":435,"templateId":28,"value":"N/A"},"437":{"id":1449,"characteristicId":437,"templateId":28,"value":"AWS, Azure, OpenStack, SaaS available"}}}},{"id":1656,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Smokescreen.png","logo":true,"scheme":false,"title":"IllusionBlack","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"alias":"illusionblack","companyTypes":[],"description":"\r\n<p>Stop Advanced Cyber Threats With Deception Technology By deploying hundreds of unique deception tripwires, IllusionBLACK maximises attack detection through the kill-chain, even against stealthy, targeted campaigns that don’t involve malware. From targeted threat intelligence of an impending attack, to detecting lateral movement in every single subnet, Smokescreen’s deception technology helps turn the tables on apex attackers.</p>\r\n\r\n\r\n<p><span style=\"font-weight: bold;\">Full Kill-Chain Coverage</span></p>\r\n\r\n\r\n<p>IllusionBLACK decoys detect pre-attack reconnaissance, spear-phishing attacks, privilege escalation, lateral movement and data-theft.</p>\r\n\r\n\r\n<p><span style=\"font-weight: bold;\">Deep Network Visibility</span></p>\r\n\r\n\r\n<p>Instantly deploy 100's of individually unique, customisable traps across all your endpoints and in every single subnet of your network.</p>\r\n\r\n\r\n<p><span style=\"font-weight: bold;\">Attack Vector Agnostic</span></p>\r\n\r\n\r\n<p>Deception does not rely on static signatures or heuristics to identify attacks, so it stays effective no matter what the bad guys try tomorrow. IllusionBLACK detects threats no matter what they attack It has advanced 3rd generation deception features, including:</p>\r\n<ul>\r\n<li>MirageMaker™. Realistic auto-created decoy data fills deceptive assets with always unique, instantly changing content.</li>\r\n<li>ThreatParse™. Natural language attack reconstruction parses raw attack data into plain-English attack analysis.</li>\r\n<li>Automated triage. Agentless investigation of compromised endpoints to reduce root cause analysis time and capture volatile forensic information.</li>\r\n<li>WebDeflect™. Integrate deception into any web or mobile application to guard against business logic attacks.</li>\r\n<li>ThreatDeflect™. Redirect attacks to decoy cloud environments to keep attackers engaged while containment kicks in.</li>\r\n<li>Forensic preservation. All evidence recorded and preserved for further analysis in industry standard formats.</li>\r\n<li>Smart Integrations. Logic-driven automatic response and orchestration to execute response strategies at wire-speed.</li>\r\n<li>Hardened BSD UNIX base. Rock-solid security built for highly-targeted environments, coupled with BSD UNIX's legendary reliability.</li>\r\n<li>Threat intelligence export. Machine consumable through STIX, JSON and CSV, as well as integrations with other security infrastructure.</li>\r\n</ul>\r\n","shortDescription":"IllusionBLACK features rapid out-of-band deployment, no performance impact, enterprise scalability, and minimal false positives","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":18,"sellingCount":2,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"IllusionBlack","keywords":"","description":"\r\n<p>Stop Advanced Cyber Threats With Deception Technology By deploying hundreds of unique deception tripwires, IllusionBLACK maximises attack detection through the kill-chain, even against stealthy, targeted campaigns that don’t involve malware. From ta","og:title":"IllusionBlack","og:description":"\r\n<p>Stop Advanced Cyber Threats With Deception Technology By deploying hundreds of unique deception tripwires, IllusionBLACK maximises attack detection through the kill-chain, even against stealthy, targeted campaigns that don’t involve malware. From ta","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Smokescreen.png"},"eventUrl":"","translationId":1657,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":199,"title":"Deception Techniques and Honeypots","alias":"deception-techniques-and-honeypots","description":"Deception technology is an emerging category of cyber security defense. Deception technology products can detect, analyze and defend against zero-day and advanced attacks, often in real time. They are automated, accurate and provide insight into malicious activity within internal networks, which may be unseen by other types of cyber defense. Deception technology enables a more proactive security posture by seeking to deceive the attackers, detect them and then defeat them, allowing the enterprise to return to normal operations.\r\nDeception technology automates the creation of traps (decoys) and/or lures, which are mixed among and within existing IT resources to provide a layer of protection to stop attackers that have penetrated the network. Traps (decoys) are IT assets that either use real licensed operating system software, or are emulations of these devices.\r\nTraps (decoys) which use emulations can also imitate medical devices, automated teller machines (ATMs), retail point of sale systems, switches, routers and much more. Lures are generally real information technology resources (files of varying kinds) which are placed on actual IT assets.\r\nUpon penetrating the network, attackers seek to establish a backdoor and then use this to identify and exfiltrate data and intellectual property. They begin moving laterally through the internal VLANs and almost immediately will "look at" one of the traps (decoys). Interacting with one of these "decoys" will trigger an alert. These alerts are very high probability and almost always coincide to an ongoing attack. The deception is designed to lure the attacker in – the attacker may consider this a worthy asset and continue by injecting malware. Deception technology generally allows for automated static and dynamic analysis of this injected malware and provides these reports through automation to the security operations personnel. Deception technology may also identify, through indicators of compromise (IOC), suspect end-points that are part of the compromise cycle. Automation also allows for an automated memory analysis of the suspect end-point, and then automatically isolates the suspect end-point. Many partner integrations allow for a variety of implementation paths for existing enterprise and government customers.\r\nInternet of things (IoT) devices are not usually scanned by legacy defense in depth cyber defense and remain prime targets for attackers within the network. Deception technology can identify attackers moving laterally into the network from within these devices.\r\nIntegrated turnkey devices that utilize embedded operating systems, but do not allow these operating systems to be scanned or closely protected by embedded end-point or intrusion detection software are also well protected by a deception technology deployment in the same network. Examples include process control systems (SCADA) used in many manufacturing applications on a global basis. Deception technology has been associated with the discovery of Zombie Zero, an attack vector wherein deception technology identified an attacker utilizing malware embedded in barcode readers which were manufactured overseas.\r\nMedical devices are particular vulnerable to cyber attacks within the healthcare networks. As FDA-certified devices they are closed systems and not accessible to standard cyber defense software. Deception technology can surround and protect these devices and identify attackers using these for backdoor placement and data exfiltration. Recently documented cyber attacks on medical devices include x-ray machines, CT scanners, MRI scanners, blood gas analyzers, PACS systems and many more. Networks utilizing these devices can be protected by deception technology. This attack vector, called medical device hijack or medjack, is estimated to have penetrated many hospitals worldwide.\r\nSpecialized deception technology products are now capable of addressing the rise in ransomware. Select products can deceive ransomware into engaging in an attack on a decoy resource, while isolating the infection points and alerting the cyber defense software team.","materialsDescription":"<span style=\"font-weight: bold;\">Why Use Deception Technology?</span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Early Post-Breach Detection</span></span>\r\nNo security solution can stop all attacks from occurring on a network, but deception technology helps to give attackers a false sense of security by making them believe they have gained a foothold in your network. From here you can monitor and record their behavior, secure in the knowledge that they can do no damage to your decoy systems. The information you record about attacker behavior and techniques can be used to further secure your network from attack.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Reduced False Positives and Risk</span></span>\r\nDead ends, false positives and alert fatigue can all hamper security efforts and put a drain on resources, if they are even analyzed at all. Too much noise can result in IT teams becoming complacent and ignoring what could potentially be a legitimate threat. Deception technology reduces the noise with fewer false positives and high fidelity alerts packed full of useful data.\r\nDeception technology is also a low risk as it has no risk to data or impact on resources or operations. When a hacker accesses or attempts to use part of the deception layer, a real and accurate alert is generated that tells admins they need to take action.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Scale and Automate at Will</span></span>\r\nWhile the threat to corporate networks and data is a daily growing concern, security teams rarely get an increase in their budget to handle the deluge of new threats. For this reason, deception technology can be a very welcome solution. Automated alerts eliminate the need for manual effort and intervention while the design of the technology allows it to be scaled easily as the organization and threat level grows.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">From Legacy to IoT</span></span>\r\nDeception technology can be used to provide breadcrumbs for a vast range of different devices, including legacy environments, industry-specific environments and even IoT devices.<br /><br />"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[],"valuesByTemplateId":{"28":{"409":{"id":1507,"characteristicId":409,"templateId":28,"value":true},"411":{"id":1508,"characteristicId":411,"templateId":28,"value":"N/A"},"413":{"id":1509,"characteristicId":413,"templateId":28,"value":true},"415":{"id":1510,"characteristicId":415,"templateId":28,"value":"N/A"},"417":{"id":1511,"characteristicId":417,"templateId":28,"value":true},"419":{"id":1512,"characteristicId":419,"templateId":28,"value":true},"421":{"id":1513,"characteristicId":421,"templateId":28,"value":true},"423":{"id":1514,"characteristicId":423,"templateId":28,"value":"N/A"},"425":{"id":1515,"characteristicId":425,"templateId":28,"value":"N/A"},"427":{"id":1516,"characteristicId":427,"templateId":28,"value":"N/A"},"429":{"id":1517,"characteristicId":429,"templateId":28,"value":"N/A"},"431":{"id":1518,"characteristicId":431,"templateId":28,"value":"N/A"},"433":{"id":1519,"characteristicId":433,"templateId":28,"value":true},"435":{"id":1520,"characteristicId":435,"templateId":28,"value":"N/A"},"437":{"id":1521,"characteristicId":437,"templateId":28,"value":"N/A"},"672":{"id":2531,"characteristicId":672,"templateId":28,"value":"N/A"},"674":{"id":2532,"characteristicId":674,"templateId":28,"value":"N/A"},"676":{"id":2533,"characteristicId":676,"templateId":28,"value":"N/A"},"678":{"id":2534,"characteristicId":678,"templateId":28,"value":"N/A"},"1182":{"id":5697,"characteristicId":1182,"templateId":28,"value":"Windows"},"1184":{"id":5698,"characteristicId":1184,"templateId":28,"value":"Active reconnaissance, Lateral movement, Exfiltration"},"1186":{"id":5699,"characteristicId":1186,"templateId":28,"value":"N/A"},"1188":{"id":5700,"characteristicId":1188,"templateId":28,"value":"N/A"},"1190":{"id":5701,"characteristicId":1190,"templateId":28,"value":"N/A"},"1192":{"id":5702,"characteristicId":1192,"templateId":28,"value":"N/A"},"1194":{"id":5703,"characteristicId":1194,"templateId":28,"value":true},"1196":{"id":5704,"characteristicId":1196,"templateId":28,"value":true},"1198":{"id":5705,"characteristicId":1198,"templateId":28,"value":true},"1200":{"id":5706,"characteristicId":1200,"templateId":28,"value":"N/A"},"1202":{"id":5707,"characteristicId":1202,"templateId":28,"value":"N/A"},"2833":{"id":7871,"characteristicId":2833,"templateId":28,"value":true},"2835":{"id":7868,"characteristicId":2835,"templateId":28,"value":true},"2837":{"id":7869,"characteristicId":2837,"templateId":28,"value":true},"2839":{"id":7870,"characteristicId":2839,"templateId":28,"value":"N/A"}}}},{"id":1650,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/illusive_networks.jpg","logo":true,"scheme":false,"title":"Illusive Networks Deception Platform","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"alias":"illusive-platform","companyTypes":[],"description":"\r\n<p> </p>\r\n<p><strong>Stop Chasing Alerts. Start Catching Attackers!</strong></p>\r\n<p>Instead of restrictive controls around your assets, reactive data analytics and the churn of SOC burn-out, Illusive offers organizations concerned about post-breach attack detection a simple alternative to the status quo. Unlike tools that are ‘probabilistic’ in their identification of an incident that might be a threat, Illusive customers gain tactical advantage over cyber adversaries armed with ‘DETERMINISTIC’ notification and precise forensic proof of an attack in motion—saving costly time in defense of your organizations most valuable assets and mission-critical infrastructure.</p>\r\n<p><strong>Agentless, Adaptive, Easy to Deploy</strong><br />Built on agentless, intelligent automation that requires very little IT coordination, Illusive immediately shifts the advantage to your defenders—and frees them from the complicated, noisy, data-heavy approaches that burden them today.</p>\r\n<p>The Illusive Platform provides centralized management across even the largest and most distributed environments. Three modular components can work together or be operated separately to preempt, detect, and respond to cyberattacks.</p>\r\n<p><strong>Preempt:</strong> Illusive <em>Attack Surface Manager</em> finds and removes errant credentials, connections, and attack pathways to deter unauthorized lateral movement.</p>\r\n<p><strong>Detect:</strong> Illusive <em>Attack Detection System</em> forces attackers to reveal themselves early in the attack process by disorienting and manipulating their decision-making.</p>\r\n<p><strong>Respond:</strong> Illusive <em>Attack Intelligence System</em> enables rapid, effective response and remediation when attackers are present by providing contextual source and target forensics.</p>\r\n<p><strong>Flip cyber asymmetry from ‘probabilistic’ to ‘deterministic’</strong></p>\r\n<p>Illusive puts onus on the attacker, frustrating them once they land on an endpoint by starving them from the real data they expect and need. An environment poisoned with false, but authentic looking data paralyzes the attacker—the second they touch an Illusive deception, they reveal themselves, instantly triggering notification and forensic proof of an attack in motion versus the hope of validating one.</p>\r\n<p>Response shifts from days or weeks of alert analysis to minutes, detailed with source and target. No data parsing or ghost chasing is needed—thus flipping your cyber asymmetry and putting you on the attack.</p>\r\n<p> </p>\r\n<p> </p>\r\n","shortDescription":"lllusive's inescapable deception technology stops cyber-attacks by paralyzing attackers, destroying their decision making ability, and depriving them the means to move towards attack targets.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":1,"sellingCount":4,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Illusive Networks Deception Platform","keywords":"","description":"\r\n<p> </p>\r\n<p><strong>Stop Chasing Alerts. Start Catching Attackers!</strong></p>\r\n<p>Instead of restrictive controls around your assets, reactive data analytics and the churn of SOC burn-out, Illusive offers organizations concerned about post-breach att","og:title":"Illusive Networks Deception Platform","og:description":"\r\n<p> </p>\r\n<p><strong>Stop Chasing Alerts. Start Catching Attackers!</strong></p>\r\n<p>Instead of restrictive controls around your assets, reactive data analytics and the churn of SOC burn-out, Illusive offers organizations concerned about post-breach att","og:image":"https://old.roi4cio.com/fileadmin/user_upload/illusive_networks.jpg"},"eventUrl":"","translationId":1651,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":199,"title":"Deception Techniques and Honeypots","alias":"deception-techniques-and-honeypots","description":"Deception technology is an emerging category of cyber security defense. Deception technology products can detect, analyze and defend against zero-day and advanced attacks, often in real time. They are automated, accurate and provide insight into malicious activity within internal networks, which may be unseen by other types of cyber defense. Deception technology enables a more proactive security posture by seeking to deceive the attackers, detect them and then defeat them, allowing the enterprise to return to normal operations.\r\nDeception technology automates the creation of traps (decoys) and/or lures, which are mixed among and within existing IT resources to provide a layer of protection to stop attackers that have penetrated the network. Traps (decoys) are IT assets that either use real licensed operating system software, or are emulations of these devices.\r\nTraps (decoys) which use emulations can also imitate medical devices, automated teller machines (ATMs), retail point of sale systems, switches, routers and much more. Lures are generally real information technology resources (files of varying kinds) which are placed on actual IT assets.\r\nUpon penetrating the network, attackers seek to establish a backdoor and then use this to identify and exfiltrate data and intellectual property. They begin moving laterally through the internal VLANs and almost immediately will "look at" one of the traps (decoys). Interacting with one of these "decoys" will trigger an alert. These alerts are very high probability and almost always coincide to an ongoing attack. The deception is designed to lure the attacker in – the attacker may consider this a worthy asset and continue by injecting malware. Deception technology generally allows for automated static and dynamic analysis of this injected malware and provides these reports through automation to the security operations personnel. Deception technology may also identify, through indicators of compromise (IOC), suspect end-points that are part of the compromise cycle. Automation also allows for an automated memory analysis of the suspect end-point, and then automatically isolates the suspect end-point. Many partner integrations allow for a variety of implementation paths for existing enterprise and government customers.\r\nInternet of things (IoT) devices are not usually scanned by legacy defense in depth cyber defense and remain prime targets for attackers within the network. Deception technology can identify attackers moving laterally into the network from within these devices.\r\nIntegrated turnkey devices that utilize embedded operating systems, but do not allow these operating systems to be scanned or closely protected by embedded end-point or intrusion detection software are also well protected by a deception technology deployment in the same network. Examples include process control systems (SCADA) used in many manufacturing applications on a global basis. Deception technology has been associated with the discovery of Zombie Zero, an attack vector wherein deception technology identified an attacker utilizing malware embedded in barcode readers which were manufactured overseas.\r\nMedical devices are particular vulnerable to cyber attacks within the healthcare networks. As FDA-certified devices they are closed systems and not accessible to standard cyber defense software. Deception technology can surround and protect these devices and identify attackers using these for backdoor placement and data exfiltration. Recently documented cyber attacks on medical devices include x-ray machines, CT scanners, MRI scanners, blood gas analyzers, PACS systems and many more. Networks utilizing these devices can be protected by deception technology. This attack vector, called medical device hijack or medjack, is estimated to have penetrated many hospitals worldwide.\r\nSpecialized deception technology products are now capable of addressing the rise in ransomware. Select products can deceive ransomware into engaging in an attack on a decoy resource, while isolating the infection points and alerting the cyber defense software team.","materialsDescription":"<span style=\"font-weight: bold;\">Why Use Deception Technology?</span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Early Post-Breach Detection</span></span>\r\nNo security solution can stop all attacks from occurring on a network, but deception technology helps to give attackers a false sense of security by making them believe they have gained a foothold in your network. From here you can monitor and record their behavior, secure in the knowledge that they can do no damage to your decoy systems. The information you record about attacker behavior and techniques can be used to further secure your network from attack.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Reduced False Positives and Risk</span></span>\r\nDead ends, false positives and alert fatigue can all hamper security efforts and put a drain on resources, if they are even analyzed at all. Too much noise can result in IT teams becoming complacent and ignoring what could potentially be a legitimate threat. Deception technology reduces the noise with fewer false positives and high fidelity alerts packed full of useful data.\r\nDeception technology is also a low risk as it has no risk to data or impact on resources or operations. When a hacker accesses or attempts to use part of the deception layer, a real and accurate alert is generated that tells admins they need to take action.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Scale and Automate at Will</span></span>\r\nWhile the threat to corporate networks and data is a daily growing concern, security teams rarely get an increase in their budget to handle the deluge of new threats. For this reason, deception technology can be a very welcome solution. Automated alerts eliminate the need for manual effort and intervention while the design of the technology allows it to be scaled easily as the organization and threat level grows.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">From Legacy to IoT</span></span>\r\nDeception technology can be used to provide breadcrumbs for a vast range of different devices, including legacy environments, industry-specific environments and even IoT devices.<br /><br />"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[],"valuesByTemplateId":{"28":{"409":{"id":1453,"characteristicId":409,"templateId":28,"value":"N/A"},"411":{"id":1454,"characteristicId":411,"templateId":28,"value":"N/A"},"413":{"id":1455,"characteristicId":413,"templateId":28,"value":true},"415":{"id":1456,"characteristicId":415,"templateId":28,"value":true},"417":{"id":1457,"characteristicId":417,"templateId":28,"value":true},"419":{"id":1458,"characteristicId":419,"templateId":28,"value":true},"421":{"id":1459,"characteristicId":421,"templateId":28,"value":true},"423":{"id":1460,"characteristicId":423,"templateId":28,"value":true},"425":{"id":1461,"characteristicId":425,"templateId":28,"value":"N/A"},"427":{"id":1462,"characteristicId":427,"templateId":28,"value":"N/A"},"429":{"id":1463,"characteristicId":429,"templateId":28,"value":"N/A"},"431":{"id":1464,"characteristicId":431,"templateId":28,"value":"N/A"},"433":{"id":1465,"characteristicId":433,"templateId":28,"value":true},"435":{"id":1466,"characteristicId":435,"templateId":28,"value":true},"437":{"id":1467,"characteristicId":437,"templateId":28,"value":"N/A"},"672":{"id":5659,"characteristicId":672,"templateId":28,"value":true},"674":{"id":5660,"characteristicId":674,"templateId":28,"value":"N/A"},"676":{"id":5661,"characteristicId":676,"templateId":28,"value":"N/A"},"678":{"id":5662,"characteristicId":678,"templateId":28,"value":"N/A"},"1182":{"id":5649,"characteristicId":1182,"templateId":28,"value":"Windows"},"1184":{"id":5650,"characteristicId":1184,"templateId":28,"value":"Active reconnaissance, Lateral movement"},"1186":{"id":5651,"characteristicId":1186,"templateId":28,"value":"N/A"},"1188":{"id":5652,"characteristicId":1188,"templateId":28,"value":true},"1190":{"id":5653,"characteristicId":1190,"templateId":28,"value":true},"1192":{"id":5654,"characteristicId":1192,"templateId":28,"value":true},"1194":{"id":5655,"characteristicId":1194,"templateId":28,"value":true},"1196":{"id":5656,"characteristicId":1196,"templateId":28,"value":"N/A"},"1198":{"id":5657,"characteristicId":1198,"templateId":28,"value":"N/A"},"1200":{"id":5658,"characteristicId":1200,"templateId":28,"value":true},"1202":{"id":5663,"characteristicId":1202,"templateId":28,"value":"N/A"},"2833":{"id":7859,"characteristicId":2833,"templateId":28,"value":"N/A"},"2835":{"id":7856,"characteristicId":2835,"templateId":28,"value":true},"2837":{"id":7857,"characteristicId":2837,"templateId":28,"value":"N/A"},"2839":{"id":7858,"characteristicId":2839,"templateId":28,"value":true}}}},{"id":2196,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Ridgeback__logo_.png","logo":true,"scheme":false,"title":"Ridgeback Interactive Deception","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"alias":"ridgeback-interactive-deception","companyTypes":[],"description":"<p>The Ridgeback Interactive Deception Platform is an enterprise security software platform that defeats malicious network invasion in real time. For any enterprise deploying Ridgeback's solutions, a network intrusion - malware propagation, an insider threats or a remotely directed exploits - encounters a network environment that appears to comprise, literally, billions of servers and other computing resources. The intant the intruder engages a phantom resource, Ridgeback provides options to eliminate or counter-engage the intruder.</p>\r\n<p style=\"padding-left: 30px;\">Ridgeback takes the fight to the enemy using Interactive Deception and causes the adversary to fruitlessly exhaust resources. This aggressive strategy results in the cost of attack outweighing the benefits of attack.</p>\r\n<p style=\"padding-left: 30px;\">Based on advanced Interactive Deception tecniques, Ridgeback makes a significant positive impact on the major gaps in cyber security that arise from reliance on perimeter defenses like FireWalls, \"after-the-fact\" analysis - oriented intrusion detection technologies, and externally dependent and vulnerable endpoint protection schemes.</p>\r\n<p style=\"padding-left: 30px;\">Ridgeback stands out in the market for two reasons - One for it's ability to act within milliseconds of a breached endpoint trying to make lateral movement, and secondly it's minimal impact on both cyber security and networking personnel from installation through operation and management. Numerous CEO's, CIOs and CISOs agree, there is no product on the market that accomplishes both.</p>","shortDescription":"Ridgeback Interactive Deception Platform influences adversary behavior, leading the adversary to engage in behaviors that reveal malicious intent.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":9,"sellingCount":7,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Ridgeback Interactive Deception","keywords":"","description":"<p>The Ridgeback Interactive Deception Platform is an enterprise security software platform that defeats malicious network invasion in real time. For any enterprise deploying Ridgeback's solutions, a network intrusion - malware propagation, an insider threats ","og:title":"Ridgeback Interactive Deception","og:description":"<p>The Ridgeback Interactive Deception Platform is an enterprise security software platform that defeats malicious network invasion in real time. For any enterprise deploying Ridgeback's solutions, a network intrusion - malware propagation, an insider threats ","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Ridgeback__logo_.png"},"eventUrl":"","translationId":2197,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":199,"title":"Deception Techniques and Honeypots","alias":"deception-techniques-and-honeypots","description":"Deception technology is an emerging category of cyber security defense. Deception technology products can detect, analyze and defend against zero-day and advanced attacks, often in real time. They are automated, accurate and provide insight into malicious activity within internal networks, which may be unseen by other types of cyber defense. Deception technology enables a more proactive security posture by seeking to deceive the attackers, detect them and then defeat them, allowing the enterprise to return to normal operations.\r\nDeception technology automates the creation of traps (decoys) and/or lures, which are mixed among and within existing IT resources to provide a layer of protection to stop attackers that have penetrated the network. Traps (decoys) are IT assets that either use real licensed operating system software, or are emulations of these devices.\r\nTraps (decoys) which use emulations can also imitate medical devices, automated teller machines (ATMs), retail point of sale systems, switches, routers and much more. Lures are generally real information technology resources (files of varying kinds) which are placed on actual IT assets.\r\nUpon penetrating the network, attackers seek to establish a backdoor and then use this to identify and exfiltrate data and intellectual property. They begin moving laterally through the internal VLANs and almost immediately will "look at" one of the traps (decoys). Interacting with one of these "decoys" will trigger an alert. These alerts are very high probability and almost always coincide to an ongoing attack. The deception is designed to lure the attacker in – the attacker may consider this a worthy asset and continue by injecting malware. Deception technology generally allows for automated static and dynamic analysis of this injected malware and provides these reports through automation to the security operations personnel. Deception technology may also identify, through indicators of compromise (IOC), suspect end-points that are part of the compromise cycle. Automation also allows for an automated memory analysis of the suspect end-point, and then automatically isolates the suspect end-point. Many partner integrations allow for a variety of implementation paths for existing enterprise and government customers.\r\nInternet of things (IoT) devices are not usually scanned by legacy defense in depth cyber defense and remain prime targets for attackers within the network. Deception technology can identify attackers moving laterally into the network from within these devices.\r\nIntegrated turnkey devices that utilize embedded operating systems, but do not allow these operating systems to be scanned or closely protected by embedded end-point or intrusion detection software are also well protected by a deception technology deployment in the same network. Examples include process control systems (SCADA) used in many manufacturing applications on a global basis. Deception technology has been associated with the discovery of Zombie Zero, an attack vector wherein deception technology identified an attacker utilizing malware embedded in barcode readers which were manufactured overseas.\r\nMedical devices are particular vulnerable to cyber attacks within the healthcare networks. As FDA-certified devices they are closed systems and not accessible to standard cyber defense software. Deception technology can surround and protect these devices and identify attackers using these for backdoor placement and data exfiltration. Recently documented cyber attacks on medical devices include x-ray machines, CT scanners, MRI scanners, blood gas analyzers, PACS systems and many more. Networks utilizing these devices can be protected by deception technology. This attack vector, called medical device hijack or medjack, is estimated to have penetrated many hospitals worldwide.\r\nSpecialized deception technology products are now capable of addressing the rise in ransomware. Select products can deceive ransomware into engaging in an attack on a decoy resource, while isolating the infection points and alerting the cyber defense software team.","materialsDescription":"<span style=\"font-weight: bold;\">Why Use Deception Technology?</span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Early Post-Breach Detection</span></span>\r\nNo security solution can stop all attacks from occurring on a network, but deception technology helps to give attackers a false sense of security by making them believe they have gained a foothold in your network. From here you can monitor and record their behavior, secure in the knowledge that they can do no damage to your decoy systems. The information you record about attacker behavior and techniques can be used to further secure your network from attack.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Reduced False Positives and Risk</span></span>\r\nDead ends, false positives and alert fatigue can all hamper security efforts and put a drain on resources, if they are even analyzed at all. Too much noise can result in IT teams becoming complacent and ignoring what could potentially be a legitimate threat. Deception technology reduces the noise with fewer false positives and high fidelity alerts packed full of useful data.\r\nDeception technology is also a low risk as it has no risk to data or impact on resources or operations. When a hacker accesses or attempts to use part of the deception layer, a real and accurate alert is generated that tells admins they need to take action.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Scale and Automate at Will</span></span>\r\nWhile the threat to corporate networks and data is a daily growing concern, security teams rarely get an increase in their budget to handle the deluge of new threats. For this reason, deception technology can be a very welcome solution. Automated alerts eliminate the need for manual effort and intervention while the design of the technology allows it to be scaled easily as the organization and threat level grows.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">From Legacy to IoT</span></span>\r\nDeception technology can be used to provide breadcrumbs for a vast range of different devices, including legacy environments, industry-specific environments and even IoT devices.<br /><br />"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[],"valuesByTemplateId":{"28":{"409":{"id":5709,"characteristicId":409,"templateId":28,"value":"N/A"},"411":{"id":5710,"characteristicId":411,"templateId":28,"value":"N/A"},"413":{"id":5713,"characteristicId":413,"templateId":28,"value":true},"415":{"id":5715,"characteristicId":415,"templateId":28,"value":"N/A"},"417":{"id":5716,"characteristicId":417,"templateId":28,"value":"N/A"},"419":{"id":5717,"characteristicId":419,"templateId":28,"value":"N/A"},"421":{"id":5718,"characteristicId":421,"templateId":28,"value":"N/A"},"423":{"id":5722,"characteristicId":423,"templateId":28,"value":"N/A"},"425":{"id":5723,"characteristicId":425,"templateId":28,"value":"N/A"},"427":{"id":5724,"characteristicId":427,"templateId":28,"value":"N/A"},"429":{"id":5727,"characteristicId":429,"templateId":28,"value":"N/A"},"431":{"id":5728,"characteristicId":431,"templateId":28,"value":"N/A"},"433":{"id":5729,"characteristicId":433,"templateId":28,"value":"N/A"},"435":{"id":5730,"characteristicId":435,"templateId":28,"value":"N/A"},"437":{"id":5731,"characteristicId":437,"templateId":28,"value":"N/A"},"672":{"id":5733,"characteristicId":672,"templateId":28,"value":"N/A"},"674":{"id":5734,"characteristicId":674,"templateId":28,"value":"N/A"},"676":{"id":5735,"characteristicId":676,"templateId":28,"value":"N/A"},"678":{"id":5736,"characteristicId":678,"templateId":28,"value":"N/A"},"1182":{"id":5708,"characteristicId":1182,"templateId":28,"value":"N/A"},"1184":{"id":5711,"characteristicId":1184,"templateId":28,"value":"Active reconnaissance, Lateral movement"},"1186":{"id":5712,"characteristicId":1186,"templateId":28,"value":"N/A"},"1188":{"id":5714,"characteristicId":1188,"templateId":28,"value":"N/A"},"1190":{"id":5719,"characteristicId":1190,"templateId":28,"value":"N/A"},"1192":{"id":5720,"characteristicId":1192,"templateId":28,"value":"N/A"},"1194":{"id":5721,"characteristicId":1194,"templateId":28,"value":"N/A"},"1196":{"id":5725,"characteristicId":1196,"templateId":28,"value":"N/A"},"1198":{"id":5726,"characteristicId":1198,"templateId":28,"value":"N/A"},"1200":{"id":5732,"characteristicId":1200,"templateId":28,"value":"N/A"},"1202":{"id":5737,"characteristicId":1202,"templateId":28,"value":"N/A"},"2833":{"id":7875,"characteristicId":2833,"templateId":28,"value":"N/A"},"2835":{"id":7872,"characteristicId":2835,"templateId":28,"value":true},"2837":{"id":7873,"characteristicId":2837,"templateId":28,"value":true},"2839":{"id":7874,"characteristicId":2839,"templateId":28,"value":true}}}},{"id":2202,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/The-Achilles-logo.png","logo":true,"scheme":false,"title":"The Achilles Javelin","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"alias":"the-achilles-javelin","companyTypes":[],"description":"<p>World's 1st Intrusion Containment Platform for Domain Networks.</p>\r\n<p>Eliminate breaches by protecting Active Directory, Domain Controllers, Domain Identities, Domain Credentials, and all Domain resources.</p>\r\n<p>90% of all corporations around the world, including governments and military entities, are using Domain Networks to manage their users, applications, and computers.</p>\r\n<p>The Domain Network is a unique form of network, one in which all of the computers, servers, and applications are connected. The industry is heavily focused on protecting these resources individually without realizing the security consequences of connecting them to a Domain environment. When a PC or server is connected to a Domain environment, it's exposed to all domain resources by design. It only takes one compromised machine to jeopardize the entire organization.</p>\r\n<p>In an environment where everything is connected, the rules of attack, as well as detection and response, are unique and different. Attackers know this, but most defenders do not. <span style=\"font-weight: bold;\">We are here to change that.</span></p>\r\n<p><span style=\"font-weight: bold;\">Solution Components</span></p>\r\n<p>Using a proprietary Memory Dissolvable Footprint, we turn the AD into an intrusion-detection and response platform with 99.34% probability of detecting an intruder within his first move while also responding to the malicious process in real-time at the endpoint.</p>\r\n<p><span style=\"font-weight: bold;\">AD Assess</span></p>\r\n<ul>\r\n<li>Continuously find backdoors and hooks attackers leave behind in your Domain.</li>\r\n<li>Identify and reduce risk affecting the Security posture of the most critical IT asset.</li>\r\n</ul>\r\n<p><span style=\"font-weight: bold;\">AD Protect</span></p>\r\n<ul>\r\n<li>Control the attacker’s perspective at the endpoint and server</li>\r\n<li>Detect attackers at the point of breach</li>\r\n<li>Autonomous investigation at the point of breach</li>\r\n<li>Stop and mitigate attackers at the point of breach</li>\r\n<li>Reveal Dark Corners the attacker favors</li>\r\n</ul>\r\n<p><span style=\"font-weight: bold;\">Javelin - Key outcomes</span></p>\r\n<ul>\r\n<li>Control the Attacker’s Perception</li>\r\n<li>Real-Time APT Detection</li>\r\n<li>Automated Investigation</li>\r\n<li>Real-Time Breach Containment</li>\r\n<li>Threat Hunting with IOCs</li>\r\n</ul>","shortDescription":"Javelin is world's 1st Intrusion Containment Platform for Domain Networks that eliminates breaches by protecting Active Directory, Domain controllers, identities, Credentials, and all it's resources.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":17,"sellingCount":8,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"The Achilles Javelin","keywords":"","description":"<p>World's 1st Intrusion Containment Platform for Domain Networks.</p>\r\n<p>Eliminate breaches by protecting Active Directory, Domain Controllers, Domain Identities, Domain Credentials, and all Domain resources.</p>\r\n<p>90% of all corporations around the world,","og:title":"The Achilles Javelin","og:description":"<p>World's 1st Intrusion Containment Platform for Domain Networks.</p>\r\n<p>Eliminate breaches by protecting Active Directory, Domain Controllers, Domain Identities, Domain Credentials, and all Domain resources.</p>\r\n<p>90% of all corporations around the world,","og:image":"https://old.roi4cio.com/fileadmin/user_upload/The-Achilles-logo.png"},"eventUrl":"","translationId":2203,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":199,"title":"Deception Techniques and Honeypots","alias":"deception-techniques-and-honeypots","description":"Deception technology is an emerging category of cyber security defense. Deception technology products can detect, analyze and defend against zero-day and advanced attacks, often in real time. They are automated, accurate and provide insight into malicious activity within internal networks, which may be unseen by other types of cyber defense. Deception technology enables a more proactive security posture by seeking to deceive the attackers, detect them and then defeat them, allowing the enterprise to return to normal operations.\r\nDeception technology automates the creation of traps (decoys) and/or lures, which are mixed among and within existing IT resources to provide a layer of protection to stop attackers that have penetrated the network. Traps (decoys) are IT assets that either use real licensed operating system software, or are emulations of these devices.\r\nTraps (decoys) which use emulations can also imitate medical devices, automated teller machines (ATMs), retail point of sale systems, switches, routers and much more. Lures are generally real information technology resources (files of varying kinds) which are placed on actual IT assets.\r\nUpon penetrating the network, attackers seek to establish a backdoor and then use this to identify and exfiltrate data and intellectual property. They begin moving laterally through the internal VLANs and almost immediately will "look at" one of the traps (decoys). Interacting with one of these "decoys" will trigger an alert. These alerts are very high probability and almost always coincide to an ongoing attack. The deception is designed to lure the attacker in – the attacker may consider this a worthy asset and continue by injecting malware. Deception technology generally allows for automated static and dynamic analysis of this injected malware and provides these reports through automation to the security operations personnel. Deception technology may also identify, through indicators of compromise (IOC), suspect end-points that are part of the compromise cycle. Automation also allows for an automated memory analysis of the suspect end-point, and then automatically isolates the suspect end-point. Many partner integrations allow for a variety of implementation paths for existing enterprise and government customers.\r\nInternet of things (IoT) devices are not usually scanned by legacy defense in depth cyber defense and remain prime targets for attackers within the network. Deception technology can identify attackers moving laterally into the network from within these devices.\r\nIntegrated turnkey devices that utilize embedded operating systems, but do not allow these operating systems to be scanned or closely protected by embedded end-point or intrusion detection software are also well protected by a deception technology deployment in the same network. Examples include process control systems (SCADA) used in many manufacturing applications on a global basis. Deception technology has been associated with the discovery of Zombie Zero, an attack vector wherein deception technology identified an attacker utilizing malware embedded in barcode readers which were manufactured overseas.\r\nMedical devices are particular vulnerable to cyber attacks within the healthcare networks. As FDA-certified devices they are closed systems and not accessible to standard cyber defense software. Deception technology can surround and protect these devices and identify attackers using these for backdoor placement and data exfiltration. Recently documented cyber attacks on medical devices include x-ray machines, CT scanners, MRI scanners, blood gas analyzers, PACS systems and many more. Networks utilizing these devices can be protected by deception technology. This attack vector, called medical device hijack or medjack, is estimated to have penetrated many hospitals worldwide.\r\nSpecialized deception technology products are now capable of addressing the rise in ransomware. Select products can deceive ransomware into engaging in an attack on a decoy resource, while isolating the infection points and alerting the cyber defense software team.","materialsDescription":"<span style=\"font-weight: bold;\">Why Use Deception Technology?</span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Early Post-Breach Detection</span></span>\r\nNo security solution can stop all attacks from occurring on a network, but deception technology helps to give attackers a false sense of security by making them believe they have gained a foothold in your network. From here you can monitor and record their behavior, secure in the knowledge that they can do no damage to your decoy systems. The information you record about attacker behavior and techniques can be used to further secure your network from attack.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Reduced False Positives and Risk</span></span>\r\nDead ends, false positives and alert fatigue can all hamper security efforts and put a drain on resources, if they are even analyzed at all. Too much noise can result in IT teams becoming complacent and ignoring what could potentially be a legitimate threat. Deception technology reduces the noise with fewer false positives and high fidelity alerts packed full of useful data.\r\nDeception technology is also a low risk as it has no risk to data or impact on resources or operations. When a hacker accesses or attempts to use part of the deception layer, a real and accurate alert is generated that tells admins they need to take action.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Scale and Automate at Will</span></span>\r\nWhile the threat to corporate networks and data is a daily growing concern, security teams rarely get an increase in their budget to handle the deluge of new threats. For this reason, deception technology can be a very welcome solution. Automated alerts eliminate the need for manual effort and intervention while the design of the technology allows it to be scaled easily as the organization and threat level grows.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">From Legacy to IoT</span></span>\r\nDeception technology can be used to provide breadcrumbs for a vast range of different devices, including legacy environments, industry-specific environments and even IoT devices.<br /><br />"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[],"valuesByTemplateId":{"28":{"409":{"id":5799,"characteristicId":409,"templateId":28,"value":"N/A"},"411":{"id":5800,"characteristicId":411,"templateId":28,"value":"N/A"},"413":{"id":5803,"characteristicId":413,"templateId":28,"value":"N/A"},"415":{"id":5805,"characteristicId":415,"templateId":28,"value":"N/A"},"417":{"id":5806,"characteristicId":417,"templateId":28,"value":"N/A"},"419":{"id":5807,"characteristicId":419,"templateId":28,"value":"N/A"},"421":{"id":5808,"characteristicId":421,"templateId":28,"value":"N/A"},"423":{"id":5812,"characteristicId":423,"templateId":28,"value":"N/A"},"425":{"id":5813,"characteristicId":425,"templateId":28,"value":"N/A"},"427":{"id":5814,"characteristicId":427,"templateId":28,"value":"N/A"},"429":{"id":5817,"characteristicId":429,"templateId":28,"value":"N/A"},"431":{"id":5818,"characteristicId":431,"templateId":28,"value":"N/A"},"433":{"id":5819,"characteristicId":433,"templateId":28,"value":"N/A"},"435":{"id":5820,"characteristicId":435,"templateId":28,"value":"N/A"},"437":{"id":5821,"characteristicId":437,"templateId":28,"value":"Yes"},"672":{"id":5823,"characteristicId":672,"templateId":28,"value":"N/A"},"674":{"id":5824,"characteristicId":674,"templateId":28,"value":"N/A"},"676":{"id":5825,"characteristicId":676,"templateId":28,"value":"N/A"},"678":{"id":5826,"characteristicId":678,"templateId":28,"value":"N/A"},"1182":{"id":5798,"characteristicId":1182,"templateId":28,"value":"Windows"},"1184":{"id":5801,"characteristicId":1184,"templateId":28,"value":"Active reconnaissance, Lateral movement"},"1186":{"id":5802,"characteristicId":1186,"templateId":28,"value":"N/A"},"1188":{"id":5804,"characteristicId":1188,"templateId":28,"value":"N/A"},"1190":{"id":5809,"characteristicId":1190,"templateId":28,"value":"N/A"},"1192":{"id":5810,"characteristicId":1192,"templateId":28,"value":"N/A"},"1194":{"id":5811,"characteristicId":1194,"templateId":28,"value":true},"1196":{"id":5815,"characteristicId":1196,"templateId":28,"value":"N/A"},"1198":{"id":5816,"characteristicId":1198,"templateId":28,"value":"N/A"},"1200":{"id":5822,"characteristicId":1200,"templateId":28,"value":"N/A"},"1202":{"id":5827,"characteristicId":1202,"templateId":28,"value":"N/A"},"2833":{"id":7887,"characteristicId":2833,"templateId":28,"value":"N/A"},"2835":{"id":7884,"characteristicId":2835,"templateId":28,"value":true},"2837":{"id":7885,"characteristicId":2837,"templateId":28,"value":"N/A"},"2839":{"id":7886,"characteristicId":2839,"templateId":28,"value":"N/A"}}}},{"id":2198,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/thinkst.png","logo":true,"scheme":false,"title":"Thinkst Canary","vendorVerified":1,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"alias":"thinkst-canary","companyTypes":[],"description":"<p>Every year, hundreds of companies only find out that they have been compromised when they are notified by a 3rd party.</p>\r\n<p><span style=\"font-weight: bold;\">This is a stupid problem!</span></p>\r\n<p>Even companies that spend millions of dollars on their security have no idea if malicious insiders are trawling around where they shouldn't be.</p>\r\n<p><span style=\"font-weight: bold;\">This is a solvable problem.</span></p>\r\n<p>Skilful adversaries move laterally within compromised networks for days or months before locating and exfiltrating a companies crown jewels.</p>\r\n<p><span style=\"font-weight: bold;\">This is a hidden opportunity.</span></p>\r\n<p>Thinkst Canary changes this. Canary devices can be set up in under 5 minutes, even on complex networks, and emulate (down to its network signatures) a number of possible systems. Simply sprinkle canary devices around your network, configure your alert settings, and wait.</p>\r\n<p>Attackers moving laterally, malicious insiders and APT all reveal their presence by interacting with your canaries.</p>\r\n<p>Many security products promise the world, if you would just re-engineer your entire network or mold all your processes around them. These products demo well, but can usually be found months later, half configured and barely used.</p>\r\n<p><span style=\"font-weight: bold;\">Canaries install in under 5 minutes, and are 100% useful on installation.</span></p>","shortDescription":"Thinkst Canary is a system for alerting when bad stuff is happening on your network.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":2,"sellingCount":8,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Thinkst Canary","keywords":"","description":"<p>Every year, hundreds of companies only find out that they have been compromised when they are notified by a 3rd party.</p>\r\n<p><span style=\"font-weight: bold;\">This is a stupid problem!</span></p>\r\n<p>Even companies that spend millions of dollars on t","og:title":"Thinkst Canary","og:description":"<p>Every year, hundreds of companies only find out that they have been compromised when they are notified by a 3rd party.</p>\r\n<p><span style=\"font-weight: bold;\">This is a stupid problem!</span></p>\r\n<p>Even companies that spend millions of dollars on t","og:image":"https://old.roi4cio.com/fileadmin/user_upload/thinkst.png"},"eventUrl":"","translationId":2199,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":199,"title":"Deception Techniques and Honeypots","alias":"deception-techniques-and-honeypots","description":"Deception technology is an emerging category of cyber security defense. Deception technology products can detect, analyze and defend against zero-day and advanced attacks, often in real time. They are automated, accurate and provide insight into malicious activity within internal networks, which may be unseen by other types of cyber defense. Deception technology enables a more proactive security posture by seeking to deceive the attackers, detect them and then defeat them, allowing the enterprise to return to normal operations.\r\nDeception technology automates the creation of traps (decoys) and/or lures, which are mixed among and within existing IT resources to provide a layer of protection to stop attackers that have penetrated the network. Traps (decoys) are IT assets that either use real licensed operating system software, or are emulations of these devices.\r\nTraps (decoys) which use emulations can also imitate medical devices, automated teller machines (ATMs), retail point of sale systems, switches, routers and much more. Lures are generally real information technology resources (files of varying kinds) which are placed on actual IT assets.\r\nUpon penetrating the network, attackers seek to establish a backdoor and then use this to identify and exfiltrate data and intellectual property. They begin moving laterally through the internal VLANs and almost immediately will "look at" one of the traps (decoys). Interacting with one of these "decoys" will trigger an alert. These alerts are very high probability and almost always coincide to an ongoing attack. The deception is designed to lure the attacker in – the attacker may consider this a worthy asset and continue by injecting malware. Deception technology generally allows for automated static and dynamic analysis of this injected malware and provides these reports through automation to the security operations personnel. Deception technology may also identify, through indicators of compromise (IOC), suspect end-points that are part of the compromise cycle. Automation also allows for an automated memory analysis of the suspect end-point, and then automatically isolates the suspect end-point. Many partner integrations allow for a variety of implementation paths for existing enterprise and government customers.\r\nInternet of things (IoT) devices are not usually scanned by legacy defense in depth cyber defense and remain prime targets for attackers within the network. Deception technology can identify attackers moving laterally into the network from within these devices.\r\nIntegrated turnkey devices that utilize embedded operating systems, but do not allow these operating systems to be scanned or closely protected by embedded end-point or intrusion detection software are also well protected by a deception technology deployment in the same network. Examples include process control systems (SCADA) used in many manufacturing applications on a global basis. Deception technology has been associated with the discovery of Zombie Zero, an attack vector wherein deception technology identified an attacker utilizing malware embedded in barcode readers which were manufactured overseas.\r\nMedical devices are particular vulnerable to cyber attacks within the healthcare networks. As FDA-certified devices they are closed systems and not accessible to standard cyber defense software. Deception technology can surround and protect these devices and identify attackers using these for backdoor placement and data exfiltration. Recently documented cyber attacks on medical devices include x-ray machines, CT scanners, MRI scanners, blood gas analyzers, PACS systems and many more. Networks utilizing these devices can be protected by deception technology. This attack vector, called medical device hijack or medjack, is estimated to have penetrated many hospitals worldwide.\r\nSpecialized deception technology products are now capable of addressing the rise in ransomware. Select products can deceive ransomware into engaging in an attack on a decoy resource, while isolating the infection points and alerting the cyber defense software team.","materialsDescription":"<span style=\"font-weight: bold;\">Why Use Deception Technology?</span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Early Post-Breach Detection</span></span>\r\nNo security solution can stop all attacks from occurring on a network, but deception technology helps to give attackers a false sense of security by making them believe they have gained a foothold in your network. From here you can monitor and record their behavior, secure in the knowledge that they can do no damage to your decoy systems. The information you record about attacker behavior and techniques can be used to further secure your network from attack.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Reduced False Positives and Risk</span></span>\r\nDead ends, false positives and alert fatigue can all hamper security efforts and put a drain on resources, if they are even analyzed at all. Too much noise can result in IT teams becoming complacent and ignoring what could potentially be a legitimate threat. Deception technology reduces the noise with fewer false positives and high fidelity alerts packed full of useful data.\r\nDeception technology is also a low risk as it has no risk to data or impact on resources or operations. When a hacker accesses or attempts to use part of the deception layer, a real and accurate alert is generated that tells admins they need to take action.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Scale and Automate at Will</span></span>\r\nWhile the threat to corporate networks and data is a daily growing concern, security teams rarely get an increase in their budget to handle the deluge of new threats. For this reason, deception technology can be a very welcome solution. Automated alerts eliminate the need for manual effort and intervention while the design of the technology allows it to be scaled easily as the organization and threat level grows.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">From Legacy to IoT</span></span>\r\nDeception technology can be used to provide breadcrumbs for a vast range of different devices, including legacy environments, industry-specific environments and even IoT devices.<br /><br />"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[],"valuesByTemplateId":{"28":{"409":{"id":5739,"characteristicId":409,"templateId":28,"value":"N/A"},"411":{"id":5740,"characteristicId":411,"templateId":28,"value":"N/A"},"413":{"id":5743,"characteristicId":413,"templateId":28,"value":"N/A"},"415":{"id":5745,"characteristicId":415,"templateId":28,"value":"N/A"},"417":{"id":5746,"characteristicId":417,"templateId":28,"value":true},"419":{"id":5747,"characteristicId":419,"templateId":28,"value":true},"421":{"id":5748,"characteristicId":421,"templateId":28,"value":true},"423":{"id":5752,"characteristicId":423,"templateId":28,"value":true},"425":{"id":5753,"characteristicId":425,"templateId":28,"value":"N/A"},"427":{"id":5754,"characteristicId":427,"templateId":28,"value":"N/A"},"429":{"id":5757,"characteristicId":429,"templateId":28,"value":"N/A"},"431":{"id":5758,"characteristicId":431,"templateId":28,"value":"N/A"},"433":{"id":5759,"characteristicId":433,"templateId":28,"value":true},"435":{"id":5760,"characteristicId":435,"templateId":28,"value":"N/A"},"437":{"id":5761,"characteristicId":437,"templateId":28,"value":"AWS, GCP"},"672":{"id":5763,"characteristicId":672,"templateId":28,"value":true},"674":{"id":5764,"characteristicId":674,"templateId":28,"value":"N/A"},"676":{"id":5765,"characteristicId":676,"templateId":28,"value":"N/A"},"678":{"id":5766,"characteristicId":678,"templateId":28,"value":true},"1182":{"id":5738,"characteristicId":1182,"templateId":28,"value":"Windows, Linux, Mac, iOS"},"1184":{"id":5741,"characteristicId":1184,"templateId":28,"value":"Active reconnaissance, Lateral movement, Exfiltration"},"1186":{"id":5742,"characteristicId":1186,"templateId":28,"value":"N/A"},"1188":{"id":5744,"characteristicId":1188,"templateId":28,"value":"N/A"},"1190":{"id":5749,"characteristicId":1190,"templateId":28,"value":"N/A"},"1192":{"id":5750,"characteristicId":1192,"templateId":28,"value":true},"1194":{"id":5751,"characteristicId":1194,"templateId":28,"value":true},"1196":{"id":5755,"characteristicId":1196,"templateId":28,"value":true},"1198":{"id":5756,"characteristicId":1198,"templateId":28,"value":true},"1200":{"id":5762,"characteristicId":1200,"templateId":28,"value":"N/A"},"1202":{"id":5767,"characteristicId":1202,"templateId":28,"value":true},"2833":{"id":7879,"characteristicId":2833,"templateId":28,"value":"N/A"},"2835":{"id":7876,"characteristicId":2835,"templateId":28,"value":true},"2837":{"id":7877,"characteristicId":2837,"templateId":28,"value":true},"2839":{"id":7878,"characteristicId":2839,"templateId":28,"value":"N/A"}}}},{"id":1724,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/TrapX_DeceptionGrid_platform.png","logo":true,"scheme":false,"title":"TrapX DeceptionGrid platform","vendorVerified":0,"rating":"3.30","implementationsCount":5,"suppliersCount":0,"alias":"trapx-deceptiongrid-platform","companyTypes":[],"description":"<div style=\"text-align: center;\"><b>DeceptionGrid</b>\r\n<div style=\"text-align: center;\">TrapX DeceptionGrid protects your valuable assets against a multitude of attacks including malicious insiders and sophisticated cybercriminals.\r\n<b>Deceive, Detect and Defeat Advanced Cyber Attackers. </b>\r\nDeceptionGrid, named the Best Deception Technology of 2018, deploys a shifting minefield of Traps (decoys) and Deception Tokens (lures) that appear identical to your real IT & IoT assets that no attacker can avoid.\r\n<b>Actionable Intelligence </b>\r\nJust one touch of a Trap by an attacker sets off a high-confidence alert. DeceptionGrid integrates with key elements of the network and security ecosystem to contain attacks and enable a return to normal operations.\r\n<b>The Deception Product of Choice </b>\r\nDeceptionGrid analyzes your network and automatically provisions hundreds-to-thousands of Traps and Lures. Each Trap is tailor-made to be identical to your native environment. Attackers can never tell what’s real and what’s fake because each Trap is designed to look and behave exactly like your real assets. In addition, Traps can also be camouflaged as any specialized IoT and OT devices.\r\n<b>Gain Access to a Powerful Community </b>\r\nFor the first time, defenders can collaborate and share deceptive counter-measures with each other. The DeceptionNet Community enables cyber-security teams to deceive cyber attackers by sharing deception strategies, new types of Traps, third-party connectors, best practices and more.\r\n<b>Deception Tokens </b>\r\nDeception Tokens (lures) appear as ordinary files, scripts and configurations, are embedded within real IT assets to bait and divert attackers away from real high value assets and into the traps.\r\n<b>Active Traps </b>\r\nActive Traps create a stream of false network traffic between deployed Traps to confuse and divert attackers that monitor the network traffic.\r\n<b><ins>Emulated Traps </ins></b>\r\n<b>Medium Interaction Emulated Traps </b>\r\nOur patented emulated traps can be deployed at the largest enterprise scale through automation. You can select from a wide variety of servers, databases, workstations, switches, routers and Traps tailor-made to your organization’s native environment. After a Trap is interacted with and the cyber-attack is thwarted, the Trap will change its shape and location, so the attacker will never learn if something is a Trap or a real asset.\r\n<b>Hundreds of New Industry Templates </b>\r\nThe DeceptionNet Community now offers hundreds of new industry templates (updated regularly) that are available for your use. In addition, our patented medium interaction traps also include expanded templates for specialized devices based on specific industries. These templates include, ATM and SWIFT assets for financial services, Point of Sale (PoS) devices for retail, as well as devices for medical, manufacturing and many more. This allows you to determine if attackers are targeting your specialized devices that are often vulnerable to attack.\r\n<b><ins>FullOS Traps </ins></b>\r\n<b>High Interaction (Full Operating System) Traps </b>\r\nDeceptionGrid enables the provision of full operating system (FullOS) Traps. Our medium interaction Traps automatically extend engaged attackers through our smart deception to our FullOS Traps for the deepest attacker diversion and engagement. FullOS Traps also enable you to clone existing assets – you can completely replicate actual production servers to further deceive attackers.","shortDescription":"The TrapX DeceptionGrid protects your valuable assets against a multitude of attacks including malicious insiders, lateral-movement, Advanced Persistent Threats (APTs) and sophisticated cybercriminals","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":10,"sellingCount":18,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"DeceptionGrid protects your valuable assets against a multitude of attacks including malicious insiders, lateral-movement","keywords":"from, TrapX, DeceptionGrid, breach, attack, platform, intelligence, remediation, protects, assets, malicious insiders, lateral-movement, Advanced Persistent Threats (APTs), sophisticated cybercriminals, Console, Attack Visualization, security operations team, intrusion, Attacker ID, attack identification, human attacker, automated attack tools, security teams, Automated Provisioning, Deception Tokens, Active Traps, Emulated Traps, Medium Interaction Emulated Traps, FullOS Traps, High Interaction (Full Operating System) Traps","description":"<div style=\"text-align: center;\"><b>DeceptionGrid</b>\r\n<div style=\"text-align: center;\">TrapX DeceptionGrid protects your valuable assets against a multitude of attacks including malicious insiders and sophisticated cybercriminals.\r\n<b>Deceive, Detect and Defe","og:title":"DeceptionGrid protects your valuable assets against a multitude of attacks including malicious insiders, lateral-movement","og:description":"<div style=\"text-align: center;\"><b>DeceptionGrid</b>\r\n<div style=\"text-align: center;\">TrapX DeceptionGrid protects your valuable assets against a multitude of attacks including malicious insiders and sophisticated cybercriminals.\r\n<b>Deceive, Detect and Defe","og:image":"https://old.roi4cio.com/fileadmin/user_upload/TrapX_DeceptionGrid_platform.png"},"eventUrl":"","translationId":1723,"dealDetails":{"avgPartnerDiscount":30,"dealProtection":1,"avgDealSize":30000,"dealSizeCurrency":"","avgDealClosing":3},"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"It is required to transfer the customer data to the vendor in order to receive a testing version for 30 days","categories":[{"id":199,"title":"Deception Techniques and Honeypots","alias":"deception-techniques-and-honeypots","description":"Deception technology is an emerging category of cyber security defense. Deception technology products can detect, analyze and defend against zero-day and advanced attacks, often in real time. They are automated, accurate and provide insight into malicious activity within internal networks, which may be unseen by other types of cyber defense. Deception technology enables a more proactive security posture by seeking to deceive the attackers, detect them and then defeat them, allowing the enterprise to return to normal operations.\r\nDeception technology automates the creation of traps (decoys) and/or lures, which are mixed among and within existing IT resources to provide a layer of protection to stop attackers that have penetrated the network. Traps (decoys) are IT assets that either use real licensed operating system software, or are emulations of these devices.\r\nTraps (decoys) which use emulations can also imitate medical devices, automated teller machines (ATMs), retail point of sale systems, switches, routers and much more. Lures are generally real information technology resources (files of varying kinds) which are placed on actual IT assets.\r\nUpon penetrating the network, attackers seek to establish a backdoor and then use this to identify and exfiltrate data and intellectual property. They begin moving laterally through the internal VLANs and almost immediately will "look at" one of the traps (decoys). Interacting with one of these "decoys" will trigger an alert. These alerts are very high probability and almost always coincide to an ongoing attack. The deception is designed to lure the attacker in – the attacker may consider this a worthy asset and continue by injecting malware. Deception technology generally allows for automated static and dynamic analysis of this injected malware and provides these reports through automation to the security operations personnel. Deception technology may also identify, through indicators of compromise (IOC), suspect end-points that are part of the compromise cycle. Automation also allows for an automated memory analysis of the suspect end-point, and then automatically isolates the suspect end-point. Many partner integrations allow for a variety of implementation paths for existing enterprise and government customers.\r\nInternet of things (IoT) devices are not usually scanned by legacy defense in depth cyber defense and remain prime targets for attackers within the network. Deception technology can identify attackers moving laterally into the network from within these devices.\r\nIntegrated turnkey devices that utilize embedded operating systems, but do not allow these operating systems to be scanned or closely protected by embedded end-point or intrusion detection software are also well protected by a deception technology deployment in the same network. Examples include process control systems (SCADA) used in many manufacturing applications on a global basis. Deception technology has been associated with the discovery of Zombie Zero, an attack vector wherein deception technology identified an attacker utilizing malware embedded in barcode readers which were manufactured overseas.\r\nMedical devices are particular vulnerable to cyber attacks within the healthcare networks. As FDA-certified devices they are closed systems and not accessible to standard cyber defense software. Deception technology can surround and protect these devices and identify attackers using these for backdoor placement and data exfiltration. Recently documented cyber attacks on medical devices include x-ray machines, CT scanners, MRI scanners, blood gas analyzers, PACS systems and many more. Networks utilizing these devices can be protected by deception technology. This attack vector, called medical device hijack or medjack, is estimated to have penetrated many hospitals worldwide.\r\nSpecialized deception technology products are now capable of addressing the rise in ransomware. Select products can deceive ransomware into engaging in an attack on a decoy resource, while isolating the infection points and alerting the cyber defense software team.","materialsDescription":"<span style=\"font-weight: bold;\">Why Use Deception Technology?</span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Early Post-Breach Detection</span></span>\r\nNo security solution can stop all attacks from occurring on a network, but deception technology helps to give attackers a false sense of security by making them believe they have gained a foothold in your network. From here you can monitor and record their behavior, secure in the knowledge that they can do no damage to your decoy systems. The information you record about attacker behavior and techniques can be used to further secure your network from attack.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Reduced False Positives and Risk</span></span>\r\nDead ends, false positives and alert fatigue can all hamper security efforts and put a drain on resources, if they are even analyzed at all. Too much noise can result in IT teams becoming complacent and ignoring what could potentially be a legitimate threat. Deception technology reduces the noise with fewer false positives and high fidelity alerts packed full of useful data.\r\nDeception technology is also a low risk as it has no risk to data or impact on resources or operations. When a hacker accesses or attempts to use part of the deception layer, a real and accurate alert is generated that tells admins they need to take action.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Scale and Automate at Will</span></span>\r\nWhile the threat to corporate networks and data is a daily growing concern, security teams rarely get an increase in their budget to handle the deluge of new threats. For this reason, deception technology can be a very welcome solution. Automated alerts eliminate the need for manual effort and intervention while the design of the technology allows it to be scaled easily as the organization and threat level grows.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">From Legacy to IoT</span></span>\r\nDeception technology can be used to provide breadcrumbs for a vast range of different devices, including legacy environments, industry-specific environments and even IoT devices.<br /><br />"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[],"valuesByTemplateId":{"28":{"409":{"id":2065,"characteristicId":409,"templateId":28,"value":"N/A"},"411":{"id":2066,"characteristicId":411,"templateId":28,"value":true},"413":{"id":2067,"characteristicId":413,"templateId":28,"value":true},"415":{"id":2068,"characteristicId":415,"templateId":28,"value":true},"417":{"id":2069,"characteristicId":417,"templateId":28,"value":true},"419":{"id":2070,"characteristicId":419,"templateId":28,"value":true},"421":{"id":2071,"characteristicId":421,"templateId":28,"value":true},"423":{"id":2072,"characteristicId":423,"templateId":28,"value":true},"425":{"id":2073,"characteristicId":425,"templateId":28,"value":true},"427":{"id":2074,"characteristicId":427,"templateId":28,"value":true},"429":{"id":2075,"characteristicId":429,"templateId":28,"value":true},"431":{"id":2076,"characteristicId":431,"templateId":28,"value":true},"433":{"id":2077,"characteristicId":433,"templateId":28,"value":true},"435":{"id":2078,"characteristicId":435,"templateId":28,"value":true},"437":{"id":2079,"characteristicId":437,"templateId":28,"value":"AWS, Azure"},"672":{"id":2514,"characteristicId":672,"templateId":28,"value":true},"674":{"id":2515,"characteristicId":674,"templateId":28,"value":true},"676":{"id":2516,"characteristicId":676,"templateId":28,"value":true},"678":{"id":2517,"characteristicId":678,"templateId":28,"value":true},"1182":{"id":5675,"characteristicId":1182,"templateId":28,"value":"Windows, Linux, Mac"},"1184":{"id":5676,"characteristicId":1184,"templateId":28,"value":"Active reconnaissance, Lateral movement, Exfiltration"},"1186":{"id":5677,"characteristicId":1186,"templateId":28,"value":true},"1188":{"id":5678,"characteristicId":1188,"templateId":28,"value":true},"1190":{"id":5679,"characteristicId":1190,"templateId":28,"value":true},"1192":{"id":5680,"characteristicId":1192,"templateId":28,"value":true},"1194":{"id":5681,"characteristicId":1194,"templateId":28,"value":true},"1196":{"id":5682,"characteristicId":1196,"templateId":28,"value":true},"1198":{"id":5683,"characteristicId":1198,"templateId":28,"value":true},"1200":{"id":5684,"characteristicId":1200,"templateId":28,"value":true},"1202":{"id":5685,"characteristicId":1202,"templateId":28,"value":true},"2833":{"id":7847,"characteristicId":2833,"templateId":28,"value":true},"2835":{"id":7844,"characteristicId":2835,"templateId":28,"value":true},"2837":{"id":7845,"characteristicId":2837,"templateId":28,"value":true},"2839":{"id":7846,"characteristicId":2839,"templateId":28,"value":true}}}},{"id":5998,"logoURL":"https://old.roi4cio.com/fileadmin/content/logo_xello_deception.png","logo":true,"schemeURL":"https://old.roi4cio.com/fileadmin/user_upload/Skhema_xello.PNG","scheme":true,"title":"Xello Deception","vendorVerified":1,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"alias":"xello-deception","companyTypes":[],"description":" Deception technology is the most effective way to detect APT attacks, as it uses attacking tactics against them. Using traps and decoys with a high level of interactivity, Deception deceives intruders by forcing them to reveal themselves, thereby closing those threats that other defenses could not cope with. Using traps (decoys) such as: user credentials, servers, sites, you can detect hackers before confidential information becomes available to them.\r\nIn 2019, many analysts again recognized the effectiveness of Deception technology in detecting advanced threats, and Gartner, Inc. For the fourth consecutive year, recommends using Deception as the top strategic security priority Various recent studies have also recorded market intentions to add Deception technology to their security controls, given its effectiveness and efficiency in deterring intruders.<br /><br /><span style=\"font-weight: bold;\">Adaptive traps - Intelligent Protection</span>\r\nIn order to stop even the most modern attacks, traps and decoys should fit perfectly into the network and adapt, even without the use of agents, as the environment changes. To be always one step ahead, modern and infrastructure-optimized lures automatically and dynamically create a false layer of information throughout your network without affecting your IT structure.<br />By constantly creating an environment in which attackers cannot distinguish real information from fake information, baits provide constant unreliability of data collection by attackers. Due to this, attackers can not rely on the collected data, and can not continue the attack.\r\n<span style=\"font-weight: bold;\">Unified centralized management system</span>\r\nXello Central Management - is the compliance with best international practices and the highest industry standards. Manage all baits / traps on protected hosts, without using an agent.<br />XCM automatically creates an optimized false surface for your network. XCM is involved in the creation, deployment and dynamic modification of decoys / traps, distributing them over the network without affecting the infrastructure in order to create the most effective level of protection.\r\nSingle management console\r\n\r\n<ul><li>Trap generation</li></ul>\r\n<ul><li>Host Distribution</li></ul>\r\n<ul><li>Incident monitoring</li></ul>\r\n<ul><li>Trap server management</li></ul>\r\n<ul><li>Flexible policy settings</li></ul>\r\n<br />Securing your corporate network made easy\r\nIn order to benefit from effective and reliable alerts, Xello offers traps designed specifically for your infrastructure that will not interrupt the work of your IT and information security teams. An effective Out-of-Box solution, automatic detection and instant AD analysis, instant creation of baits and an agentless way to distribute them ensure that there are no disruptions to users.\r\nAs your organization changes and evolves, Xello Deception will adapt to provide early detection of attacks. By placing lures in new places and updating them to adapt to changes, Xello Deception constantly monitors your network and adapts protection to provide tools that will evolve with your organization.<br /><br />Xello: lures and traps everywhere\r\nXello finds attackers using their strengths against them. Our solution creates a deception layer throughout your network, creating an environment in which attackers cannot rely on the information they collect. If hackers cannot collect reliable information, they cannot make the right decisions, which leads to their quick detection.<br /><br /><span style=\"font-weight: bold;\">Low False positive - a new level of SOC efficiency</span>\r\nSince the bait is not visible to ordinary users, the presence of false alerts tends to zero; Each notice of bait usage is a highly accurate sign of an attack.\r\nAlerts occur in real time only with the confirmed interaction of the attacker with the bait and, unlike other detection methods, are not dependent on signatures or behavioral analysis to detect an attack. Alerts are immediately sent to SIEM, which can be used to automate the blocking of an attacker and / or isolate infected hosts so that the company can completely eliminate the threat on the network. False alarms are eliminated, and high-precision alerts save valuable SOC time.<br /><br /><span style=\"font-weight: bold;\">Benefits:</span>\r\n<ul><li>Lack of agent on workstations and servers</li></ul>\r\n<ul><li>The first and only Russian solution of this class</li></ul>\r\n<ul><li>Does not allow attackers to distinguish real data from Traps and Decoys</li></ul>\r\n<ul><li>Increased attack detection with optimal placement of Trap</li></ul>\r\n<ul><li>Continuous network monitoring and adaptive protection</li></ul>\r\n<ul><li>Lack of service and disruption to the company</li></ul>\r\n<ul><li>Minimal impact on IT infrastructure</li></ul>\r\n<ul><li>Autonomous system without the use of other tools</li></ul>\r\n<ul><li>Distribution of Traps and Decoys with one click</li></ul>\r\n<ul><li>False positive tends to zero</li></ul>","shortDescription":"Xello Deception is the last line of defense","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":19,"sellingCount":4,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Xello Deception","keywords":"","description":" Deception technology is the most effective way to detect APT attacks, as it uses attacking tactics against them. Using traps and decoys with a high level of interactivity, Deception deceives intruders by forcing them to reveal themselves, thereby closing thos","og:title":"Xello Deception","og:description":" Deception technology is the most effective way to detect APT attacks, as it uses attacking tactics against them. Using traps and decoys with a high level of interactivity, Deception deceives intruders by forcing them to reveal themselves, thereby closing thos","og:image":"https://old.roi4cio.com/fileadmin/content/logo_xello_deception.png"},"eventUrl":"","translationId":6053,"dealDetails":{"avgPartnerDiscount":40,"dealProtection":0,"avgDealSize":100000,"dealSizeCurrency":"","avgDealClosing":6},"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":199,"title":"Deception Techniques and Honeypots","alias":"deception-techniques-and-honeypots","description":"Deception technology is an emerging category of cyber security defense. Deception technology products can detect, analyze and defend against zero-day and advanced attacks, often in real time. They are automated, accurate and provide insight into malicious activity within internal networks, which may be unseen by other types of cyber defense. Deception technology enables a more proactive security posture by seeking to deceive the attackers, detect them and then defeat them, allowing the enterprise to return to normal operations.\r\nDeception technology automates the creation of traps (decoys) and/or lures, which are mixed among and within existing IT resources to provide a layer of protection to stop attackers that have penetrated the network. Traps (decoys) are IT assets that either use real licensed operating system software, or are emulations of these devices.\r\nTraps (decoys) which use emulations can also imitate medical devices, automated teller machines (ATMs), retail point of sale systems, switches, routers and much more. Lures are generally real information technology resources (files of varying kinds) which are placed on actual IT assets.\r\nUpon penetrating the network, attackers seek to establish a backdoor and then use this to identify and exfiltrate data and intellectual property. They begin moving laterally through the internal VLANs and almost immediately will "look at" one of the traps (decoys). Interacting with one of these "decoys" will trigger an alert. These alerts are very high probability and almost always coincide to an ongoing attack. The deception is designed to lure the attacker in – the attacker may consider this a worthy asset and continue by injecting malware. Deception technology generally allows for automated static and dynamic analysis of this injected malware and provides these reports through automation to the security operations personnel. Deception technology may also identify, through indicators of compromise (IOC), suspect end-points that are part of the compromise cycle. Automation also allows for an automated memory analysis of the suspect end-point, and then automatically isolates the suspect end-point. Many partner integrations allow for a variety of implementation paths for existing enterprise and government customers.\r\nInternet of things (IoT) devices are not usually scanned by legacy defense in depth cyber defense and remain prime targets for attackers within the network. Deception technology can identify attackers moving laterally into the network from within these devices.\r\nIntegrated turnkey devices that utilize embedded operating systems, but do not allow these operating systems to be scanned or closely protected by embedded end-point or intrusion detection software are also well protected by a deception technology deployment in the same network. Examples include process control systems (SCADA) used in many manufacturing applications on a global basis. Deception technology has been associated with the discovery of Zombie Zero, an attack vector wherein deception technology identified an attacker utilizing malware embedded in barcode readers which were manufactured overseas.\r\nMedical devices are particular vulnerable to cyber attacks within the healthcare networks. As FDA-certified devices they are closed systems and not accessible to standard cyber defense software. Deception technology can surround and protect these devices and identify attackers using these for backdoor placement and data exfiltration. Recently documented cyber attacks on medical devices include x-ray machines, CT scanners, MRI scanners, blood gas analyzers, PACS systems and many more. Networks utilizing these devices can be protected by deception technology. This attack vector, called medical device hijack or medjack, is estimated to have penetrated many hospitals worldwide.\r\nSpecialized deception technology products are now capable of addressing the rise in ransomware. Select products can deceive ransomware into engaging in an attack on a decoy resource, while isolating the infection points and alerting the cyber defense software team.","materialsDescription":"<span style=\"font-weight: bold;\">Why Use Deception Technology?</span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Early Post-Breach Detection</span></span>\r\nNo security solution can stop all attacks from occurring on a network, but deception technology helps to give attackers a false sense of security by making them believe they have gained a foothold in your network. From here you can monitor and record their behavior, secure in the knowledge that they can do no damage to your decoy systems. The information you record about attacker behavior and techniques can be used to further secure your network from attack.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Reduced False Positives and Risk</span></span>\r\nDead ends, false positives and alert fatigue can all hamper security efforts and put a drain on resources, if they are even analyzed at all. Too much noise can result in IT teams becoming complacent and ignoring what could potentially be a legitimate threat. Deception technology reduces the noise with fewer false positives and high fidelity alerts packed full of useful data.\r\nDeception technology is also a low risk as it has no risk to data or impact on resources or operations. When a hacker accesses or attempts to use part of the deception layer, a real and accurate alert is generated that tells admins they need to take action.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Scale and Automate at Will</span></span>\r\nWhile the threat to corporate networks and data is a daily growing concern, security teams rarely get an increase in their budget to handle the deluge of new threats. For this reason, deception technology can be a very welcome solution. Automated alerts eliminate the need for manual effort and intervention while the design of the technology allows it to be scaled easily as the organization and threat level grows.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">From Legacy to IoT</span></span>\r\nDeception technology can be used to provide breadcrumbs for a vast range of different devices, including legacy environments, industry-specific environments and even IoT devices.<br /><br />"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[],"valuesByTemplateId":{"28":{"409":{"id":15707,"characteristicId":409,"templateId":28,"value":true},"411":{"id":15708,"characteristicId":411,"templateId":28,"value":false},"413":{"id":15711,"characteristicId":413,"templateId":28,"value":false},"415":{"id":15713,"characteristicId":415,"templateId":28,"value":false},"417":{"id":15714,"characteristicId":417,"templateId":28,"value":true},"419":{"id":15715,"characteristicId":419,"templateId":28,"value":true},"421":{"id":15716,"characteristicId":421,"templateId":28,"value":false},"423":{"id":15720,"characteristicId":423,"templateId":28,"value":true},"425":{"id":15721,"characteristicId":425,"templateId":28,"value":false},"427":{"id":15722,"characteristicId":427,"templateId":28,"value":false},"429":{"id":15725,"characteristicId":429,"templateId":28,"value":false},"431":{"id":15726,"characteristicId":431,"templateId":28,"value":false},"433":{"id":15727,"characteristicId":433,"templateId":28,"value":false},"435":{"id":15728,"characteristicId":435,"templateId":28,"value":false},"437":{"id":15729,"characteristicId":437,"templateId":28,"value":"Yes"},"672":{"id":15731,"characteristicId":672,"templateId":28,"value":true},"674":{"id":15732,"characteristicId":674,"templateId":28,"value":false},"676":{"id":15733,"characteristicId":676,"templateId":28,"value":false},"678":{"id":15734,"characteristicId":678,"templateId":28,"value":false},"1182":{"id":15706,"characteristicId":1182,"templateId":28,"value":"Windows, Linux"},"1184":{"id":15709,"characteristicId":1184,"templateId":28,"value":"Lateral movement, Exfiltration"},"1186":{"id":15710,"characteristicId":1186,"templateId":28,"value":false},"1188":{"id":15712,"characteristicId":1188,"templateId":28,"value":false},"1190":{"id":15717,"characteristicId":1190,"templateId":28,"value":false},"1192":{"id":15718,"characteristicId":1192,"templateId":28,"value":true},"1194":{"id":15719,"characteristicId":1194,"templateId":28,"value":true},"1196":{"id":15723,"characteristicId":1196,"templateId":28,"value":true},"1198":{"id":15724,"characteristicId":1198,"templateId":28,"value":true},"1200":{"id":15730,"characteristicId":1200,"templateId":28,"value":true},"1202":{"id":15735,"characteristicId":1202,"templateId":28,"value":true}}}}],"selectedTemplateId":28},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}