Xello Deception
1.00

Problems that solves

Complex and non-transparent business processes

Non-compliant with IT security requirements

Risk of data loss or damage

Risk of attacks by hackers

Risk or Leaks of confidential information

Unauthorized access to corporate IT systems and data

Decentralized IT systems

Values

Ensure Security and Business Continuity

Ensure Compliance

Centralize management

Xello Deception

Xello Deception is the last line of defense

Description

Deception technology is the most effective way to detect APT attacks, as it uses attacking tactics against them. Using traps and decoys with a high level of interactivity, Deception deceives intruders by forcing them to reveal themselves, thereby closing those threats that other defenses could not cope with. Using traps (decoys) such as: user credentials, servers, sites, you can detect hackers before confidential information becomes available to them. In 2019, many analysts again recognized the effectiveness of Deception technology in detecting advanced threats, and Gartner, Inc. For the fourth consecutive year, recommends using Deception as the top strategic security priority Various recent studies have also recorded market intentions to add Deception technology to their security controls, given its effectiveness and efficiency in deterring intruders.

Adaptive traps - Intelligent Protection In order to stop even the most modern attacks, traps and decoys should fit perfectly into the network and adapt, even without the use of agents, as the environment changes. To be always one step ahead, modern and infrastructure-optimized lures automatically and dynamically create a false layer of information throughout your network without affecting your IT structure.
By constantly creating an environment in which attackers cannot distinguish real information from fake information, baits provide constant unreliability of data collection by attackers. Due to this, attackers can not rely on the collected data, and can not continue the attack. Unified centralized management system Xello Central Management - is the compliance with best international practices and the highest industry standards. Manage all baits / traps on protected hosts, without using an agent.
XCM automatically creates an optimized false surface for your network. XCM is involved in the creation, deployment and dynamic modification of decoys / traps, distributing them over the network without affecting the infrastructure in order to create the most effective level of protection. Single management console
  • Trap generation
  • Host Distribution
  • Incident monitoring
  • Trap server management
  • Flexible policy settings

Securing your corporate network made easy In order to benefit from effective and reliable alerts, Xello offers traps designed specifically for your infrastructure that will not interrupt the work of your IT and information security teams. An effective Out-of-Box solution, automatic detection and instant AD analysis, instant creation of baits and an agentless way to distribute them ensure that there are no disruptions to users. As your organization changes and evolves, Xello Deception will adapt to provide early detection of attacks. By placing lures in new places and updating them to adapt to changes, Xello Deception constantly monitors your network and adapts protection to provide tools that will evolve with your organization.

Xello: lures and traps everywhere Xello finds attackers using their strengths against them. Our solution creates a deception layer throughout your network, creating an environment in which attackers cannot rely on the information they collect. If hackers cannot collect reliable information, they cannot make the right decisions, which leads to their quick detection.

Low False positive - a new level of SOC efficiency Since the bait is not visible to ordinary users, the presence of false alerts tends to zero; Each notice of bait usage is a highly accurate sign of an attack. Alerts occur in real time only with the confirmed interaction of the attacker with the bait and, unlike other detection methods, are not dependent on signatures or behavioral analysis to detect an attack. Alerts are immediately sent to SIEM, which can be used to automate the blocking of an attacker and / or isolate infected hosts so that the company can completely eliminate the threat on the network. False alarms are eliminated, and high-precision alerts save valuable SOC time.

Benefits:
  • Lack of agent on workstations and servers
  • The first and only Russian solution of this class
  • Does not allow attackers to distinguish real data from Traps and Decoys
  • Increased attack detection with optimal placement of Trap
  • Continuous network monitoring and adaptive protection
  • Lack of service and disruption to the company
  • Minimal impact on IT infrastructure
  • Autonomous system without the use of other tools
  • Distribution of Traps and Decoys with one click
  • False positive tends to zero

Transaction Features

Partner average discount

Deal protection

Average deal size

Average deal closing time

Scheme of work

 Scheme of work

User features

Roles of Interested Employees

Chief Executive Officer

Chief Information Officer

Chief Technical Officer

Chief IT Security Officer

IT Security and Risk Management

Organizational Features

GDPR Compliance

IT Security Department in company

Internet access is available for employees