For VendorsBlog
Login
TrapX DeceptionGrid platform

Add to comparison

TrapX DeceptionGrid platform

3.4
Pitch
The TrapX DeceptionGrid protects your valuable assets against a multitude of attacks including malicious insiders, lateral-movement, Advanced Persistent Threats (APTs) and sophisticated cybercriminals

Features of product

Проблемы Pain points
  • Risk of attacks by hackers
  • Risk or Leaks of confidential information
  • Unauthorized access to corporate IT systems and data
Ценности Business Values
  • Ensure Security and Business Continuity
  • Reduce Costs
Матрица сравнения с конкурентами Matrix of comparison with competitors
Тестирование Testing
It is required to transfer the customer data to the vendor in order to receive a testing version for 30 days
Описание

About Product

The TrapX DeceptionGrid platform protects your valuable assets against a multitude of attacks including malicious insiders and sophisticated cybercriminals.

The Deception Product of Choice

DeceptionGrid’s depth and breadth of deception capability is unmatched. Our powerful architecture presents the deception attack surfaces that best match attacker activity. Learn more below.

Console with Attack Visualization

New expanded visualization enables the security operations team to rapidly understand the activities of the attacker over time, from the originating intrusion to the assets they are engaging with, to the final containment.

Attacker ID

New attack identification automatically determines if an attack is being conducted by a human attacker, or automated attack tools, giving security teams a better understanding of the attack and subsequent containment methods.

Automated Provisioning

 Automated Provision of Deception Components. DeceptionGrid scans your existing network and provisions hundreds-to-thousands of deception components including Tokens (lures) and Traps (decoys).

Deception Tokens

Deception Tokens (lures) appear as ordinary files, scripts and databases, are embedded within real IT assets to bait and divert attackers.

Active Traps

New active traps functionality creates a stream of false network traffic between deployed traps to confuse and divert attackers that monitor the network traffic.

Emulated Traps

Medium Interaction Emulated Traps

Our patented emulated traps can be deployed at the largest enterprise scale through automation. You can select from a wide variety of servers, databases, workstations, switches, routers and more.

Industry Templates

The patented medium interaction traps now include expanded templates for specialized devices based on industries. These templates include, ATM’s and SWIFT assets for financial services, or Point of Sale (PoS) devices for retail, as well as devices for medical, manufacturing and many more, allowing customers to determine if attackers are targeting specialized devices that are often vulnerable to attack.

FullOS Traps

High Interaction (Full Operating System) Traps

DeceptionGrid enables the provision of full operating system (fullOS) traps. Our medium interaction traps automatically extend engaged attackers through our smart deception to our fullOS decoys for the deepest attacker diversion and engagement. FullOS traps also enable customers to clone existing assets – you can completely replicate actual production servers to further deceive attackers.

 

Характеристики

Characteristics

Deception Tokens (fake OS platforms)

Windows;Linux

Web App integration N/A
C&C detection
Detecting attacks in stages

Active reconnaissance;Lateral movement;Exfiltration

Detection of MITM
Emulated traps
Industry-specific lures
NAC integration
Full OS traps
SIEM Integration

Features of deal

Средняя скидка партнера Average Partner Discount
Защита сделки Deal Protection
Средний размер сделки Average Deal Size
Средний срок закрытия сделки Average Time of Deal Closing
Login

or

Registration

to learn more

Features of users

Роли заинтересованных сотрудников Stakeholders Roles
  • Chief Information Officer
  • Chief IT Security Officer
  • IT Security and Risk Management
Используют так же Also use
  • DLP - Appliance
  • WAF-web application firewall appliance
  • Web filtering - Appliance
  • NGFW - next-generation firewall
  • DLP - Data Leak Prevention
  • PAM - privileged access management
  • SIEM - Security Information and Event Management
  • SOC - Situation Centre
  • Penetration Testing
  • UEBA - User and Entity Behavior Analytics
  • WAF-web application firewall
  • Web filtering
  • NGFW - next-generation firewall
Признаки применимости Company requirements
  • GDPR Compliance
  • IT Security Department in company
  • Сonfidential data
Продающие истории Use Cases

The Use of Deception Techniques : Honeypots and Decoys

Honeypots and similar sorts of decoys represent only the most rudimentary uses of deception in protection of information systems. But because of their relative popularity and cultural interest, they have gained substantial attention in the research and commercial communities. In this paper we will introduce honeypots and similar sorts of decoys, discuss their historical use in defense of information systems, and describe some of their uses today. We will then go into a bit of the theory behind deceptions, discuss their limitations, and put them in the greater context of information protection.

Source pdfs.semanticscholar.org/a41b/7ab1c9bdad7cca82e739f9e08413eede7881.pdf

Designing Adaptive Deception Strategies

Deception-based defense is the process by which actions are intentionally employed to cause misrepresentation and induce erroneous inferences on attackers. Deception can be employed in different levels of computation, from network to application-level, which demands careful planning and coordination between multiple strategies and tactics. Despite of advances on using deception in computer defenses, ad-hoc approaches are still used for their design. As a result, deception is realized essentially as single tools or as entire solutions repackaged as honeypot machines. In this paper, we propose a model to specify coordinated deception tactics based on adaptive architectures.

Our contributions rely on a deception-based defense life-cycle approach integrated in a software design process, including a model to specify coordinated deception strategies.

Source nova-lincs.di.fct.unl.pt/system/publication_files/files/000/000/645/original/DesigningAdaptiveDeceptionStrategies.pdf

Gartner's Hype Cycle for Threat – Facing Technologies 2018

Продающия история

Gartner's Hype Cycle for Threat – Facing Technologies 2018

share.trapx.com/dl/UAdJjhfvwD

Materials