A Ponemon Institute Study
Illusive’s latest technology minimizes the spread of critical assets to harden the network.
Stop targeted ATM cyberattacks with an endpoint-based deception approach…
Dynamic environments create security gaps that attract attacks from inside and out…
See why Frost & Sullivan awarded Illusive’s Innovation Award for ‘uniquely different’ approach to deception technology.
Capitalize on the powerful synergies made possible by Illusive’s integration solutions
Illusive offers a range of pre-built integrations and enables CEF/Syslog integration with any SIEM. Illusive can also ingest incidents from any other source and collect real-time host forensics of the same depth provided for Illusive-generated incidents. All incident records are manageable through Illusive’s console, and can be viewed using the Illusive Forensics Timeline.
To integrate with any SIEM tool, Illusive sends data via the CEF/Syslog protocol.
Integrating Illusive with HP ArcSight log & event management solution creates a strong bi-directional relationship. Illusive feeds ArcSight reliable, real-time data such as incident reports and high fidelity alerts, while ArcSight makes its database available to Illusive so it may enrich its threat forensics. With this integration, customers benefit from a more complete, actionable perspective on activities in the system.
The integration between Illusive and Splunk’s SIEM and log managements solutions allows Illusive to obtain rich data that empowers its detection capabilities, data analysis process, and forensics data, while also feeding Splunk with reliable, real-time attack information and high fidelity alerts.
Eliminate APT attacks at the earliest possible stage by pairing Illusive’s high-fidelity detection with Cisco ISE & pxGrid’s mitigation capabilities. With this integration, users can define and execute automated mitigation sequences directly from the Illusive console, and automatically block attacks in real time.
CyberArk provides a comprehensive solution for protecting, monitoring, detecting and responding to all privileged account activity. Illusive integrates with CyberArk Application Identity Manager to securely retrieve privileged credentials, secured and managed by CyberArk, to access hosts on the network for deceptions deployment and forensics collection. By integrating the CyberArk solution with Illusive, organizations benefit from the superior deception technology combined with the leading privileged accounts security solution.
Illusive supports seamless integration with all management solutions, including open source tools such as Puppet and Ansible, and proprietary tools such as the below:
Microsoft System Center Configuration Manager (SCCM) allows administrators to manage application deployment and security of devices across an enterprise. Illusive integrates with SCCM to deploy and monitor deceptions so customers can maintain a unified deployment architecture and use their own deployment tools policies.
The Tanium platform offers endpoint visibility and control across an entire organization. The integration between Tanium and Illusive allows the user to deploy and monitor deceptions using his existing endpoint management & deployment tool.
Illusive syncs with VirusTotal to pool their collective forensic resources. From this integration, users can capitalize on reports that analyze processes on hosts and identify sources of infiltration.
By pairing Illusive with OpenDNS, admins are notified when there’s an attempt to reach a malicious site or IP address, and receive Illusive’s real-time, source-based forensics.
© Copyright Illusive Networks, 2019. All Rights Reserved.
Upload your Resume* 2MB Max; .doc, .docx or .pdf only