When success begets success in America, some find their home country is less a market than an incubatorRead More >
Another reason cited by nearly every Israeli entrepreneur you talk to: the time zone, which makes having half your team in Israel a lot less punishing than if you were based in San Francisco. “Seven hours’ time difference and 10 hours’ time difference might not seem like a big difference, but it is,” says Ofer Israeli, chief executive of cybersecurity company Illusive Networks.
“In a very broad sense, the world has understood that yes, we want to control our perimeter, but if that’s no longer feasible, we need to detect hackers and respond as efficiently as possible,” said Ofer Israeli, founder and CEO of Illusive Networks
when Israeli cybersecurity firm GuardiCore launched five years ago, its founders had little difficulty hiring people, thanks to their connections in the Israeli Defense Forces. But that changed when Amazon came to town and offered salaries to some employees of 25% to 50% more than GuardiCore was paying.Read More >
This, alongside the MoneyTaker ATM thefts, is further evidence that the availability of nation-state tools has proven cyber-intrusions inevitable,” said CEO and founder of Illusive Networks Ofer Israeli, via email. “Our research has uncovered one common weakness in all these attacks—regardless of how initial intrusion is achieved, once inside the gates, advanced professional hackers must move laterally to reach their targets. By understanding this, and focusing on identifying lateral movement, defenders can stop even the most sophisticated attackers before they reach an organization’s crown jewels, and do so before intrusion becomes a damaging and costly breach.”
Illusive Networks stops APTs at the lateral movement step by deploying decoys at every endpoint throughout the infrastructure. If the hacker falls for a single decoy, the Illusive technology then kicks into forensic mode, collecting information about it in order to identify and stop the attack.
How state-of-the-art tools make it practical and cost-effective to identify and engage attackers in early lateral movement stages to prevent them from reaching critical systems and data.Read more >
Deception-based technology from the likes of Illusive Networks and others as well as network-based intrusion prevention technology aims to combat similar threats.
But a wave of deception technology startups such as Cymmetria, Illusive Networks, and TrapX, as well as veteran security firms, offer commercial products that allow organizations to be a bit more aggressive in their defenses with phony devices or fake data to lure and catch attackers in action.
Illusive Networks places extra network destinations and shares inside a server's deep data stores. An attacker lands on a decoy and looks where to go next, finding a mix of real and phoney destinations, which all look genuine.Read more >
As soon as attackers attempt to use the deceptive data, Illusive detects and alerts enterprise security teams, providing real-time, contextual forensic data from the source host that enable informed, targeted and timely incident response operations.Read more >
Citi’s global venture arm has also invested in three Israeli startups: cybersecurity firm Illusive Networks, Dyadic Security and BlueVine, an online lender.Read more >
Automatically generated and AI-driven, Illusive Networks' deceptions are tailor-made for the customer’s environment to appear realistic and authentic to attackers.Read more >
Behind loginMicrosoft Ventures was launched last year for the purpose of investing in start-ups, with its portfolio currently including Illusive Networks and Aqua Security.Read more >
We provide real-time visualization of where the attacker is in relation to these risk sensitive assets... Illusive helps SOCs prioritize high-risk incidents, and eventually deal with the most urgent tasks.Read more >
Starting from the proposition that some hackers will find their way through traditional firewalls and other security obstacles, Illusive uses virtual and augmented reality technology to create a decoy version of a company’s network to trap hackers.Read more >
Deception networks take the honeypot concept to the extreme, creating fake administrator accounts, applications, and data that reside next to genuine components on the same machine.Read More >
Illusive networks pushes out deception data (user credentials, net connections, shares etc) to all systems on the network. This is done by an executable that runs periodically and then cleans up after itself. This means that every production system in the environment becomes part of the deception. This effectively corrupts the data that an attacker needs to continue to operate in an environment.Read More >
Israeli-security startup illusive networks announced an expansion of its deception technology solution at Black Hat with the launch of the External Incident Application Program Interface (API) and Risk Metrics tool.Read More >
The top 100 companies on the The Cybersecurity 500 listRead More >
illusive networks launches its External Incident Application Program InterfaceRead More >
illusive networks looks at the biggest threat facing the cyber industry today - targeted attacks - and tries to solve it from the perspective of the attackers.Read More >
“If we can accept that even with the best of threat prevention and detection, we will be breached, then adding deceptions can flip the paradigm,”Read More >