{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"comparison":{"compare":{"_type":"localeString","en":"Compare","ru":"Сравнить"},"characteristics":{"ru":"Характеристики","_type":"localeString","en":"Characteristics"},"additional_template":{"en":"Additional characteristics","ru":"Дополнительные характеристики","_type":"localeString"},"nothing_to_show":{"ru":"Нет данных для отображения","_type":"localeString","en":"No data to compare"}},"header":{"help":{"de":"Hilfe","ru":"Помощь","_type":"localeString","en":"Help"},"how":{"en":"How does it works","de":"Wie funktioniert es","ru":"Как это работает","_type":"localeString"},"login":{"_type":"localeString","en":"Log in","de":"Einloggen","ru":"Вход"},"logout":{"en":"logout","ru":"Выйти","_type":"localeString"},"faq":{"en":"FAQ","de":"FAQ","ru":"FAQ","_type":"localeString"},"references":{"en":"Requests","de":"References","ru":"Мои запросы","_type":"localeString"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find-it-product":{"_type":"localeString","en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта"},"autoconfigurator":{"_type":"localeString","en":" Price calculator","ru":"Калькулятор цены"},"comparison-matrix":{"en":"Comparison Matrix","ru":"Матрица сравнения","_type":"localeString"},"roi-calculators":{"ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"b4r":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"business-booster":{"en":"Business boosting","ru":"Развитие бизнеса","_type":"localeString"},"catalogs":{"ru":"Каталоги","_type":"localeString","en":"Catalogs"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"en":"Deployments","ru":"Внедрения","_type":"localeString"},"companies":{"_type":"localeString","en":"Companies","ru":"Компании"},"categories":{"_type":"localeString","en":"Categories","ru":"Категории"},"for-suppliers":{"en":"For suppliers","ru":"Поставщикам","_type":"localeString"},"blog":{"ru":"Блог","_type":"localeString","en":"Blog"},"agreements":{"ru":"Сделки","_type":"localeString","en":"Deals"},"my-account":{"ru":"Мой кабинет","_type":"localeString","en":"My account"},"register":{"en":"Register","ru":"Зарегистрироваться","_type":"localeString"},"comparison-deletion":{"ru":"Удаление","_type":"localeString","en":"Deletion"},"comparison-confirm":{"ru":"Подтвердите удаление","_type":"localeString","en":"Are you sure you want to delete"},"search-placeholder":{"ru":"Введите поисковый запрос","_type":"localeString","en":"Enter your search term"},"my-profile":{"ru":"Мои Данные","_type":"localeString","en":"My Profile"},"about":{"en":"About Us","_type":"localeString"},"it_catalogs":{"en":"IT catalogs","_type":"localeString"},"roi4presenter":{"en":"Roi4Presenter","_type":"localeString"},"roi4webinar":{"_type":"localeString","en":"Roi4Webinar"},"sub_it_catalogs":{"_type":"localeString","en":"Find IT product"},"sub_b4reference":{"en":"Get reference from user","_type":"localeString"},"sub_roi4presenter":{"_type":"localeString","en":"Make online presentations"},"sub_roi4webinar":{"en":"Create an avatar for the event","_type":"localeString"},"catalogs_new":{"_type":"localeString","en":"Products"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"},"it_products":{"en":"Find and compare IT products","_type":"localeString"},"it_implementations":{"_type":"localeString","en":"Learn implementation reviews"},"it_companies":{"_type":"localeString","en":"Find vendor and company-supplier"},"it_categories":{"_type":"localeString","en":"Calculate ROI and price"},"it_our_products":{"_type":"localeString","en":"Our Products"},"it_it_catalogs":{"en":"IT catalogs","_type":"localeString"}},"footer":{"copyright":{"ru":"Все права защищены","_type":"localeString","en":"All rights reserved","de":"Alle rechte vorbehalten"},"company":{"de":"Über die Firma","ru":"О компании","_type":"localeString","en":"My Company"},"about":{"ru":"О нас","_type":"localeString","en":"About us","de":"Über uns"},"infocenter":{"en":"Infocenter","de":"Infocenter","ru":"Инфоцентр","_type":"localeString"},"tariffs":{"_type":"localeString","en":"Subscriptions","de":"Tarife","ru":"Тарифы"},"contact":{"de":"Kontaktiere uns","ru":"Связаться с нами","_type":"localeString","en":"Contact us"},"marketplace":{"ru":"Marketplace","_type":"localeString","en":"Marketplace","de":"Marketplace"},"products":{"ru":"Продукты","_type":"localeString","en":"Products","de":"Produkte"},"compare":{"de":"Wähle und vergleiche","ru":"Подобрать и сравнить","_type":"localeString","en":"Pick and compare"},"calculate":{"ru":"Расчитать стоимость","_type":"localeString","en":"Calculate the cost","de":"Kosten berechnen"},"get_bonus":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference","de":"Holen Sie sich einen Rabatt"},"salestools":{"de":"Salestools","ru":"Salestools","_type":"localeString","en":"Salestools"},"automatization":{"ru":"Автоматизация расчетов","_type":"localeString","en":"Settlement Automation","de":"Abwicklungsautomatisierung"},"roi_calcs":{"ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators","de":"ROI-Rechner"},"matrix":{"de":"Vergleichsmatrix","ru":"Матрица сравнения","_type":"localeString","en":"Comparison matrix"},"b4r":{"en":"Rebate 4 Reference","de":"Rebate 4 Reference","ru":"Rebate 4 Reference","_type":"localeString"},"our_social":{"ru":"Наши социальные сети","_type":"localeString","en":"Our social networks","de":"Unsere sozialen Netzwerke"},"subscribe":{"de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку","_type":"localeString","en":"Subscribe to newsletter"},"subscribe_info":{"ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта","_type":"localeString","en":"and be the first to know about promotions, new features and recent software reviews"},"policy":{"ru":"Политика конфиденциальности","_type":"localeString","en":"Privacy Policy"},"user_agreement":{"en":"Agreement","ru":"Пользовательское соглашение ","_type":"localeString"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"quote":{"ru":"Калькулятор цены","_type":"localeString","en":"Price calculator"},"boosting":{"en":"Business boosting","ru":"Развитие бизнеса","_type":"localeString"},"4vendors":{"_type":"localeString","en":"4 vendors","ru":"поставщикам"},"blog":{"en":"blog","ru":"блог","_type":"localeString"},"pay4content":{"ru":"платим за контент","_type":"localeString","en":"we pay for content"},"categories":{"ru":"категории","_type":"localeString","en":"categories"},"showForm":{"_type":"localeString","en":"Show form","ru":"Показать форму"},"subscribe__title":{"ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!","_type":"localeString","en":"We send a digest of actual news from the IT world once in a month!"},"subscribe__email-label":{"ru":"Email","_type":"localeString","en":"Email"},"subscribe__name-label":{"ru":"Имя","_type":"localeString","en":"Name"},"subscribe__required-message":{"_type":"localeString","en":"This field is required","ru":"Это поле обязательное"},"subscribe__notify-label":{"en":"Yes, please, notify me about news, events and propositions","ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях","_type":"localeString"},"subscribe__agree-label":{"en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data","ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*","_type":"localeString"},"subscribe__submit-label":{"ru":"Подписаться","_type":"localeString","en":"Subscribe"},"subscribe__email-message":{"_type":"localeString","en":"Please, enter the valid email","ru":"Пожалуйста, введите корректный адрес электронной почты"},"subscribe__email-placeholder":{"_type":"localeString","en":"username@gmail.com","ru":"username@gmail.com"},"subscribe__name-placeholder":{"en":"Last, first name","ru":"Имя Фамилия","_type":"localeString"},"subscribe__success":{"en":"You are successfully subscribed! Check you mailbox.","ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString"},"subscribe__error":{"ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее.","_type":"localeString","en":"Subscription is unsuccessful. Please, try again later."},"roi4presenter":{"en":"Roi4Presenter","de":"roi4presenter","ru":"roi4presenter","_type":"localeString"},"it_catalogs":{"en":"IT catalogs","_type":"localeString"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"b4reference":{"en":"Bonus4Reference","_type":"localeString"}},"breadcrumbs":{"home":{"ru":"Главная","_type":"localeString","en":"Home"},"companies":{"_type":"localeString","en":"Companies","ru":"Компании"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"en":"Deployments","ru":"Внедрения","_type":"localeString"},"login":{"en":"Login","ru":"Вход","_type":"localeString"},"registration":{"en":"Registration","ru":"Регистрация","_type":"localeString"},"b2b-platform":{"ru":"Портал для покупателей, поставщиков и производителей ИТ","_type":"localeString","en":"B2B platform for IT buyers, vendors and suppliers"}},"comment-form":{"title":{"en":"Leave comment","ru":"Оставить комментарий","_type":"localeString"},"firstname":{"en":"First name","ru":"Имя","_type":"localeString"},"lastname":{"_type":"localeString","en":"Last name","ru":"Фамилия"},"company":{"ru":"Компания","_type":"localeString","en":"Company name"},"position":{"ru":"Должность","_type":"localeString","en":"Position"},"actual-cost":{"ru":"Фактическая стоимость","_type":"localeString","en":"Actual cost"},"received-roi":{"ru":"Полученный ROI","_type":"localeString","en":"Received ROI"},"saving-type":{"ru":"Тип экономии","_type":"localeString","en":"Saving type"},"comment":{"en":"Comment","ru":"Комментарий","_type":"localeString"},"your-rate":{"ru":"Ваша оценка","_type":"localeString","en":"Your rate"},"i-agree":{"ru":"Я согласен","_type":"localeString","en":"I agree"},"terms-of-use":{"ru":"С пользовательским соглашением и политикой конфиденциальности","_type":"localeString","en":"With user agreement and privacy policy"},"send":{"ru":"Отправить","_type":"localeString","en":"Send"},"required-message":{"ru":"{NAME} - это обязательное поле","_type":"localeString","en":"{NAME} is required filed"}},"maintenance":{"title":{"en":"Site under maintenance","ru":"На сайте проводятся технические работы","_type":"localeString"},"message":{"ru":"Спасибо за ваше понимание","_type":"localeString","en":"Thank you for your understanding"}}},"translationsStatus":{"comparison":"success"},"sections":{},"sectionsStatus":{},"pageMetaData":{"comparison":{"title":{"ru":"Сравнить продукты","_type":"localeString","en":"Compare products"}}},"pageMetaDataStatus":{"comparison":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{"28":{"id":28,"title":"Deception Techniques and Honeypots","characteristics":[{"id":403,"title":"Deception Tokens for WIn","required":0,"type":"binary"},{"id":405,"title":"Deception Tokens for Lin","required":0,"type":"binary"},{"id":407,"title":"Deception Tokens for Mac","required":0,"type":"binary"},{"id":409,"title":"Web App integration","required":0,"type":"binary"},{"id":411,"title":"C&C detection","required":0,"type":"binary"},{"id":413,"title":"Emulated traps","required":0,"type":"binary"},{"id":415,"title":"NAC integration","required":0,"type":"binary"},{"id":417,"title":"Full OS traps","required":0,"type":"binary"},{"id":419,"title":"SIEM Integration","required":0,"type":"binary"},{"id":421,"title":"Endpoint integration","required":0,"type":"binary"},{"id":423,"title":"Built-in correlation","required":0,"type":"binary"},{"id":425,"title":"Built-in ticketing","required":0,"type":"binary"},{"id":427,"title":"Sanbox integration","required":0,"type":"binary"},{"id":429,"title":"POS","required":0,"type":"binary"},{"id":431,"title":"ATM","required":0,"type":"binary"},{"id":433,"title":"SCADA","required":0,"type":"binary"},{"id":435,"title":"IoT","required":0,"type":"binary"},{"id":437,"title":"Clouds","required":0,"type":"multiselect"},{"id":672,"title":"Open API for integration","required":0,"type":"binary"},{"id":674,"title":"Botnet detection","required":0,"type":"binary"},{"id":676,"title":"Automatic code analysis","required":0,"type":"binary"},{"id":678,"title":"Custom trap builder","required":0,"type":"binary"}]}},"comparisonByTemplateId":{},"products":[{"id":1652,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Acalvio.png","logo":true,"scheme":false,"title":"Acalvio Shadowplex","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"alias":"acalvio-shadowplex","companyTypes":[],"description":"ShadowPlex Autonomous Deception\r\n<ul>\r\n<li>Accurate Detection</li>\r\n<li>Timely Detection</li>\r\n<li>Cost-Effective Detection</li>\r\n</ul>\r\nShadowPlex is designed for Enterprise IT, IoT and ICS environments and based on patented innovations. <span style=\"font-weight: bold;\">Deception Farms</span> Deception-farms is a seminal innovation that delivers scale and adaptability. Sensors are placed in the network segments. All decoys are born and live in a centralized virtual server farm. They are projected onto the network, thus optimizing resource consumption and delivers flexibility. <span style=\"font-weight: bold;\">Fluid Deception</span> Fluid Deception is a patented technology that achieves resource efficiency by just in time decoy creation, minimizing costs, maximizing effectiveness. No longer do you have to choose between emulation and full host decoys. <span style=\"font-weight: bold;\">Security Ecosystem Integrations</span> ShadowPlex provides comprehensive API support allowing Deception campaigns to be orchestrated from other environments. This also facilitates integration with 3rd party security tools such as:\r\n<ul>\r\n<li>Threat Intelligence</li>\r\n<li>IT Change Management platforms</li>\r\n<li>SOAR (Security Orchestration and Response)</li>\r\n<li>SIEM</li>\r\n<li>Perimeter Defense</li>\r\n<li>NAC (Network Access Control)</li>\r\n<li>Vulnerability Managers</li>\r\n<li>SSO, Identity Management, Privileged User Management Systems</li>\r\n<li>EDR, End-point</li>\r\n</ul>\r\n","shortDescription":"ShadowPlex is an Autonomous, Enterprise-Scale Distributed Deception Platform (DDP)","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":4,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Acalvio Shadowplex","keywords":"Deception, Detection, Management, ShadowPlex, that, delivers, network, Fluid","description":"ShadowPlex Autonomous Deception\r\rAccurate Detection\rTimely Detection\rCost-Effective Detection\r\rShadowPlex is designed for Enterprise IT, IoT and ICS","og:title":"Acalvio Shadowplex","og:description":"ShadowPlex Autonomous Deception\r\rAccurate Detection\rTimely Detection\rCost-Effective Detection\r\rShadowPlex is designed for Enterprise IT, IoT and ICS","og:image":"https://old.b4r.io/fileadmin/user_upload/Acalvio.png"},"eventUrl":"","translationId":1653,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":199,"title":"Deception Techniques and Honeypots","alias":"deception-techniques-and-honeypots","description":"","materialsDescription":""}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[],"valuesByTemplateId":{"28":{"403":{"id":1786,"characteristicId":403,"templateId":28,"value":true},"405":{"id":1787,"characteristicId":405,"templateId":28,"value":"N/A"},"407":{"id":1788,"characteristicId":407,"templateId":28,"value":"N/A"},"409":{"id":1789,"characteristicId":409,"templateId":28,"value":"N/A"},"411":{"id":1790,"characteristicId":411,"templateId":28,"value":"N/A"},"413":{"id":1791,"characteristicId":413,"templateId":28,"value":"N/A"},"415":{"id":1792,"characteristicId":415,"templateId":28,"value":"N/A"},"417":{"id":1793,"characteristicId":417,"templateId":28,"value":true},"419":{"id":1794,"characteristicId":419,"templateId":28,"value":true},"421":{"id":1795,"characteristicId":421,"templateId":28,"value":true},"423":{"id":1796,"characteristicId":423,"templateId":28,"value":true},"425":{"id":1797,"characteristicId":425,"templateId":28,"value":"N/A"},"427":{"id":1798,"characteristicId":427,"templateId":28,"value":"N/A"},"429":{"id":1799,"characteristicId":429,"templateId":28,"value":"N/A"},"431":{"id":1800,"characteristicId":431,"templateId":28,"value":"N/A"},"433":{"id":1801,"characteristicId":433,"templateId":28,"value":"N/A"},"435":{"id":1802,"characteristicId":435,"templateId":28,"value":true},"437":{"id":1803,"characteristicId":437,"templateId":28,"value":"AWS, Azure, OpenStack"},"672":{"id":2855,"characteristicId":672,"templateId":28,"value":"N/A"},"674":{"id":2856,"characteristicId":674,"templateId":28,"value":"N/A"},"676":{"id":2857,"characteristicId":676,"templateId":28,"value":"N/A"},"678":{"id":2858,"characteristicId":678,"templateId":28,"value":"N/A"}}}},{"id":1638,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Attivo_Networks.png","logo":true,"scheme":false,"title":"Attivo Networks ThreatDefend Platform™","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"alias":"attivo-networks-threatdefend-platformtm","companyTypes":[],"description":"Threat Deception Technology to Detect Threats Early, Accurately & Efficiently The ThreatDefend Deception Platform is a modular solution comprised of Attivo BOTsink® engagement servers, decoys, and deceptions, the ThreatStrikeTM endpoint deception suite, ThreatPathTM for attack path visibility, ThreatOpsTM incident response orchestration playbooks, and the Attivo Central Manager (ACM), which together create a comprehensive early detection and active defense against cyber threats. <span style=\"font-weight: bold;\">WHY CUSTOMERS CHOOSE THREAT DECEPTION</span>\r\n<ul>\r\n<li>EARLY WARNING SYSTEM</li>\r\n<li>ACTIONABLE ALERTS</li>\r\n<li>EASY TO DEPLOY</li>\r\n<li>LOW MAINTENANCE</li>\r\n<li>STRENGTHENS DEFENSES</li>\r\n</ul>\r\nDETECT KNOW & UNKNOWN ATTACKS Not reliant on signatures or pattern matching, the Attivo ThreatDefend solution accurately detects in-network reconnaissance, credential theft, Man-in-the-Middle attacks, and lateral movement of threats that other security controls miss. EARLY & ACCURATE DETECTION Threat deception provides early detection of external, insider, and 3rd party attacks. Achieve real-time threat detection of reconnaissance and credential theft activities as attackers are deceived into engaging with decoys, deception lures, and bait designed to entice hackers into revealing themselves. NO ALERT FATIGUE FROM FALSE POSITIVES High-fidelity alerts are raised based upon attacker decoy engagement or deception credential reuse. Each alert is substantiated with rich threat intelligence and is actionable, removing false positive and noisy alerts that distract from the prompt incident response of real threats. NOT RESOURCE INTENSIVE Easy to deploy and operate, the Attivo solution is design to be low maintenance. Deployment is in hours and doesn’t require highly skilled employees or in-depth resources for ongoing operations. Machine learning, automated analysis, and incident response empower quick remediation. CAMOUFLAGE Realistic deception is key to deceiving attackers into engaging. Dynamic deception provides authenticity and deception campaigns for self-learning deployment and refresh. <span style=\"font-weight: bold;\">Authenticity</span>\r\n<ul>\r\n<li>Customized using real OS and services to production assets</li>\r\n<li>Credential validation with Active Directory</li>\r\n<li>High-interaction engagement</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Machine-Learning</span>\r\n<ul>\r\n<li>Self-learning of the environment generates deception campaigns</li>\r\n<li>Campaigns can be deployed on demand for environment refresh</li>\r\n<li>Allows automated refresh to spin up deception or avoid fingerprinting</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Easy Operations</span>\r\n<ul>\r\n<li>Simplify deployment with automated campaign proposals</li>\r\n<li>Easy operations with automated refresh</li>\r\n<li>Choice of on demand or automated campaign deployment</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">FEATURES</span> ThreatDefend is a comprehensive, scalable detection platform designed for the early detection of external threat actors and insiders (employees, suppliers, contractors) and for accelerating incident response. IN-NETWORK THREAT DETECTION Early endpoint, network, application, and data post-compromise threat detection. ATTACK SURFACE SCALABILITY Deception for evolving attack surface: data centers, cloud, user networks, remote office, specialty networks. EASY DEPLOYMENT & OPERATIONS Flexible deployment options and machine-learning for ongoing campaign authenticity and refresh. SUBSTANTIATED ALERTS & FORENSICS Actionable alerts from attacker engagement or credential reuse. Full forensics for actionable response. ATTACK ANALYSIS Automated attack analysis and correlation improves time-to-remediation. THREAT INTELLIGENCE High interaction attacker engagement and DecoyDocs produce threat, adversary, and counterintelligence. ACCELERATED INCIDENT RESPONSE Extensive 3rd party automations accelerate incident response to block, isolate, and threat hunt. ATTACK PATH VULNERABILITY ASSESSMENT Understand attack path vulnerabilities based on exposed credentials and misconfigurations. VISIBILITY & ATTACK MAPS Topographical maps for network visualization and time-lapsed attack replay.","shortDescription":"ThreatDefend Platform™ is Deception Technology for early post-compromise threat detection and accelerated incident response.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":7,"sellingCount":5,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Attivo Networks ThreatDefend Platform™","keywords":"deception, threat, response, detection, engagement, Attivo, attack, refresh","description":"Threat Deception Technology to Detect Threats Early, Accurately & Efficiently The ThreatDefend Deception Platform is a modular solution comprised of Attivo","og:title":"Attivo Networks ThreatDefend Platform™","og:description":"Threat Deception Technology to Detect Threats Early, Accurately & Efficiently The ThreatDefend Deception Platform is a modular solution comprised of Attivo","og:image":"https://old.b4r.io/fileadmin/user_upload/Attivo_Networks.png"},"eventUrl":"","translationId":1639,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":199,"title":"Deception Techniques and Honeypots","alias":"deception-techniques-and-honeypots","description":"","materialsDescription":""}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[],"valuesByTemplateId":{"28":{"403":{"id":1696,"characteristicId":403,"templateId":28,"value":true},"405":{"id":1697,"characteristicId":405,"templateId":28,"value":true},"407":{"id":1698,"characteristicId":407,"templateId":28,"value":true},"409":{"id":1699,"characteristicId":409,"templateId":28,"value":"N/A"},"411":{"id":1700,"characteristicId":411,"templateId":28,"value":"N/A"},"413":{"id":1701,"characteristicId":413,"templateId":28,"value":"N/A"},"415":{"id":1702,"characteristicId":415,"templateId":28,"value":true},"417":{"id":1703,"characteristicId":417,"templateId":28,"value":true},"419":{"id":1704,"characteristicId":419,"templateId":28,"value":true},"421":{"id":1705,"characteristicId":421,"templateId":28,"value":"N/A"},"423":{"id":1706,"characteristicId":423,"templateId":28,"value":true},"425":{"id":1707,"characteristicId":425,"templateId":28,"value":true},"427":{"id":1708,"characteristicId":427,"templateId":28,"value":"N/A"},"429":{"id":1709,"characteristicId":429,"templateId":28,"value":true},"431":{"id":1710,"characteristicId":431,"templateId":28,"value":"N/A"},"433":{"id":1711,"characteristicId":433,"templateId":28,"value":true},"435":{"id":1712,"characteristicId":435,"templateId":28,"value":true},"437":{"id":1713,"characteristicId":437,"templateId":28,"value":"AWS, Azure, OpenStack"},"672":{"id":2847,"characteristicId":672,"templateId":28,"value":"N/A"},"674":{"id":2848,"characteristicId":674,"templateId":28,"value":true},"676":{"id":2849,"characteristicId":676,"templateId":28,"value":"N/A"},"678":{"id":2850,"characteristicId":678,"templateId":28,"value":"N/A"}}}},{"id":1640,"logoURL":"https://old.b4r.io/fileadmin/user_upload/CyberTrap.png","logo":true,"schemeURL":"https://old.b4r.io/fileadmin/user_upload/cybertrap_scheme.png","scheme":true,"title":"CyberTrap","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"alias":"cybertrap","companyTypes":[],"description":"\r\nOur deception technology is designed with one purpose in mind – to stop attackers from breaching your system and causing damage. Our local threat intelligence feeds help to keep attackers out of your network. CyberTrap offers comfortable, stress-free 24/7 protection while gathering vital intelligence on attacker activities and intent.\r\n\r\n<ul>\r\n<li>Local threat intelligence feeds</li>\r\n<li>Insight on attacker activities</li>\r\n<li>No false positives</li>\r\n</ul>\r\n\r\n<span style=\"font-weight: bold;\">Managed services</span>\r\nOur deception as a managed service has been previously accessible only to large companies. For the first time midsize companies can benefit from deception security in a convenient subscription model that won’t stretch their budget or resources.\r\n\r\n<ul>\r\n<li>No capital investment</li>\r\n<li>No need to hire experts</li>\r\n<li>No overhead costs</li>\r\n</ul>\r\n\r\n<span style=\"font-weight: bold;\">Supported services</span>\r\nLarge enterprises and government agencies are vulnerable to persistent attacks. Such organizations usually have an internal security team which can be supported by CyberTrap. We provide training and assistance to help kickstart your deception operation.\r\n\r\n<ul>\r\n<li>Easy integration with existing security stack</li>\r\n<li>All the necessary training provided</li>\r\n<li>Fast and reliable customer support</li>\r\n</ul>\r\n\r\n<span style=\"font-weight: bold;\">CyberTrap is the solution for your Company</span>\r\nImplementing an extra layer of deception security is the right move for any organization storing valuable, highly sensitive data which hackers desire.\r\n\r\n<ul>\r\n<li>Government & law enforcement agencies</li>\r\n<li>Banking, financial services & insurance (BFSI)</li>\r\n<li>IT, telecom & technology</li>\r\n<li>Utilities & and national critical infrastructure (CNI)</li>\r\n<li>Production plants & manufacturing</li>\r\n<li>E-commerce & retail chains</li>\r\n<li>Healthcare companies</li>\r\n</ul>\r\n\r\n\r\n ","shortDescription":"CyberTrap is a deception technology designed with one purpose in mind – to stop attackers from breaching your system and causing damage. ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":9,"sellingCount":6,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"CyberTrap","keywords":"deception, your, CyberTrap, security, services, companies, intelligence, feeds","description":"\rOur deception technology is designed with one purpose in mind – to stop attackers from breaching your system and causing damage. Our local threat","og:title":"CyberTrap","og:description":"\rOur deception technology is designed with one purpose in mind – to stop attackers from breaching your system and causing damage. Our local threat","og:image":"https://old.b4r.io/fileadmin/user_upload/CyberTrap.png"},"eventUrl":"","translationId":1641,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":199,"title":"Deception Techniques and Honeypots","alias":"deception-techniques-and-honeypots","description":"","materialsDescription":""}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[],"valuesByTemplateId":{"28":{"403":{"id":1714,"characteristicId":403,"templateId":28,"value":true},"405":{"id":1715,"characteristicId":405,"templateId":28,"value":"N/A"},"407":{"id":1716,"characteristicId":407,"templateId":28,"value":"N/A"},"409":{"id":1717,"characteristicId":409,"templateId":28,"value":true},"411":{"id":1718,"characteristicId":411,"templateId":28,"value":"N/A"},"413":{"id":1719,"characteristicId":413,"templateId":28,"value":"N/A"},"415":{"id":1720,"characteristicId":415,"templateId":28,"value":"N/A"},"417":{"id":1721,"characteristicId":417,"templateId":28,"value":true},"419":{"id":1722,"characteristicId":419,"templateId":28,"value":"N/A"},"421":{"id":1723,"characteristicId":421,"templateId":28,"value":"N/A"},"423":{"id":1724,"characteristicId":423,"templateId":28,"value":"N/A"},"425":{"id":1725,"characteristicId":425,"templateId":28,"value":"N/A"},"427":{"id":1726,"characteristicId":427,"templateId":28,"value":"N/A"},"429":{"id":1727,"characteristicId":429,"templateId":28,"value":"N/A"},"431":{"id":1728,"characteristicId":431,"templateId":28,"value":"N/A"},"433":{"id":1729,"characteristicId":433,"templateId":28,"value":"N/A"},"435":{"id":1730,"characteristicId":435,"templateId":28,"value":"N/A"},"437":{"id":1731,"characteristicId":437,"templateId":28,"value":"SaaS available"}}}},{"id":1646,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Cymmetria.png","logo":true,"scheme":false,"title":"Cymmetria’s MazeRunner","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"alias":"cymmetrias-mazerunner","companyTypes":[],"description":"\r\n<ul>\r\n<li>Get reliable detection.MazeRunner leads attackers away from real targets and creates a footprint of the attack</li>\r\n<li>Investigation Forensic.Improve incident response.MazeRunner provides rich forensic data and insights, such as the source of the attack and tools used by the attacker</li>\r\n<li>Real Alerts.Focus on real alerts.MazeRunner generates real, reliable alerts</li>\r\n<li>Mitigation. Quarantine and block attackers. MazeRunner gathers attack information and integrates with existing tools in the organization to quarantine and block attackers</li>\r\n</ul>\r\n","shortDescription":"Cymmetria’s MazeRunner platform lets you dominate an attacker’s movements from the very beginning and lead them to a monitored deception network.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":17,"sellingCount":8,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Cymmetria’s MazeRunner","keywords":"MazeRunner, attack, attackers, real, reliable, alerts, block, tools","description":"\r\rGet reliable detection.MazeRunner leads attackers away from real targets and creates a footprint of the attack\rInvestigation Forensic.Improve incident","og:title":"Cymmetria’s MazeRunner","og:description":"\r\rGet reliable detection.MazeRunner leads attackers away from real targets and creates a footprint of the attack\rInvestigation Forensic.Improve incident","og:image":"https://old.b4r.io/fileadmin/user_upload/Cymmetria.png"},"eventUrl":"","translationId":1647,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":199,"title":"Deception Techniques and Honeypots","alias":"deception-techniques-and-honeypots","description":"","materialsDescription":""}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[],"valuesByTemplateId":{"28":{"403":{"id":1732,"characteristicId":403,"templateId":28,"value":true},"405":{"id":1733,"characteristicId":405,"templateId":28,"value":"N/A"},"407":{"id":1734,"characteristicId":407,"templateId":28,"value":"N/A"},"409":{"id":1735,"characteristicId":409,"templateId":28,"value":"N/A"},"411":{"id":1736,"characteristicId":411,"templateId":28,"value":"N/A"},"413":{"id":1737,"characteristicId":413,"templateId":28,"value":"N/A"},"415":{"id":1738,"characteristicId":415,"templateId":28,"value":"N/A"},"417":{"id":1739,"characteristicId":417,"templateId":28,"value":true},"419":{"id":1740,"characteristicId":419,"templateId":28,"value":"N/A"},"421":{"id":1741,"characteristicId":421,"templateId":28,"value":"N/A"},"423":{"id":1742,"characteristicId":423,"templateId":28,"value":true},"425":{"id":1743,"characteristicId":425,"templateId":28,"value":"N/A"},"427":{"id":1744,"characteristicId":427,"templateId":28,"value":"N/A"},"429":{"id":1745,"characteristicId":429,"templateId":28,"value":"N/A"},"431":{"id":1746,"characteristicId":431,"templateId":28,"value":"N/A"},"433":{"id":1747,"characteristicId":433,"templateId":28,"value":"N/A"},"435":{"id":1748,"characteristicId":435,"templateId":28,"value":true},"437":{"id":1749,"characteristicId":437,"templateId":28,"value":"N/A"},"672":{"id":2851,"characteristicId":672,"templateId":28,"value":"N/A"},"674":{"id":2852,"characteristicId":674,"templateId":28,"value":"N/A"},"676":{"id":2853,"characteristicId":676,"templateId":28,"value":"N/A"},"678":{"id":2854,"characteristicId":678,"templateId":28,"value":"N/A"}}}},{"id":1654,"logoURL":"https://old.b4r.io/fileadmin/user_upload/FIDELIS.PNG","logo":true,"scheme":false,"title":"Fidelis Elevate","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"alias":"fidelis-elevate","companyTypes":[],"description":"Fidelis Elevate™\r\n<ul>\r\n<li>Automate Detection</li>\r\n<li>Automate Response</li>\r\n<li>Prevent Data Theft</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Elevate Security Operations</span> Even with many prevention tools in place, organizations are still getting breached. That's why more organizations are shifting from a prevention-focused approach to a detection and response strategy. Fidelis Elevate is the only security operations platform that provides deep visibility, threat intelligence and context across complex environments to automate detection and response. <span style=\"font-weight: bold;\">A Force Multiplier for Your Security Operations</span> Fidelis Elevate™ integrates network visibility, data loss prevention, deception, and endpoint detection and response into one unified solution. Now your security team can focus on the most urgent threats and protect sensitive data rather than spending time validating and triaging thousands of alerts. <span style=\"font-weight: bold;\">Enhance Your Visibility and Detection Capabilities</span>\r\n<ul>\r\n<li>Enrich alerts with data and context from Fidelis Network®, Fidelis Endpoint®, and Fidelis Deception™ – all in a unified platform</li>\r\n<li>Combine threat intelligence, sandboxing, machine learning, deception, and Fidelis research</li>\r\n<li>Capture and store metadata for analysis and threat hunting</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Automate Response for Quick and Effective Resolution</span>\r\n<ul>\r\n<li>Draw conclusions with accuracy by automatically collapsing many alerts and events into a single view</li>\r\n<li>Automatically validate network alerts on the endpoint with certainty</li>\r\n<li>Raise the priority level when evidence is found of increased risk</li>\r\n<li>Automatically execute a response playbook to jumpstart your investigation with clarity</li>\r\n<li>Stop data leakage, command and control, and active attacks</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">Ensure Best-of-Breed Breach Detection and Network DLP</span> Fidelis Network® provides deep visibility – across sessions, packets, and content – and automatically validates, correlates, and consolidates network alerts against every endpoint in your network for fast response. <span style=\"font-weight: bold;\">Automate Endpoint Detection and Response</span> Fidelis Endpoint® increases endpoint visibility, reduces response time from hours to minutes and enhances endpoint protection. <span style=\"font-weight: bold;\"><br /></span> <span style=\"font-weight: bold;\">Detect Post-Breach Attacks With an Active Deception Defense</span> Fidelis Deception™ automatically profiles networks and assets to create deception layers that are as realistic as possible to detect post-breach attacks. <span style=\"font-weight: bold;\">Fidelis Network Module</span> Leverage Curated Threat Intelligence for More Accurate Detection Fidelis Insight™ analyzes real-time and historical data, so you can rapidly detect and respond to threats in your environment, even when they happened in the past.","shortDescription":"Fidelis Elevate is one unified platform ensures faster detection and automated response – providing accuracy, clarity and certainty for your cyber security team.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":8,"sellingCount":13,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Fidelis Elevate","keywords":"Fidelis, response, alerts, endpoint, with, data, Detection, Elevate","description":"Fidelis Elevate™\r\rAutomate Detection\rAutomate Response\rPrevent Data Theft\r\rElevate Security Operations Even with many prevention tools in place,","og:title":"Fidelis Elevate","og:description":"Fidelis Elevate™\r\rAutomate Detection\rAutomate Response\rPrevent Data Theft\r\rElevate Security Operations Even with many prevention tools in place,","og:image":"https://old.b4r.io/fileadmin/user_upload/FIDELIS.PNG"},"eventUrl":"","translationId":1655,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":199,"title":"Deception Techniques and Honeypots","alias":"deception-techniques-and-honeypots","description":"","materialsDescription":""}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[],"valuesByTemplateId":{"28":{"403":{"id":1804,"characteristicId":403,"templateId":28,"value":true},"405":{"id":1805,"characteristicId":405,"templateId":28,"value":"N/A"},"407":{"id":1806,"characteristicId":407,"templateId":28,"value":"N/A"},"409":{"id":1807,"characteristicId":409,"templateId":28,"value":"N/A"},"411":{"id":1808,"characteristicId":411,"templateId":28,"value":true},"413":{"id":1809,"characteristicId":413,"templateId":28,"value":true},"415":{"id":1810,"characteristicId":415,"templateId":28,"value":"N/A"},"417":{"id":1811,"characteristicId":417,"templateId":28,"value":true},"419":{"id":1812,"characteristicId":419,"templateId":28,"value":true},"421":{"id":1813,"characteristicId":421,"templateId":28,"value":"N/A"},"423":{"id":1814,"characteristicId":423,"templateId":28,"value":true},"425":{"id":1815,"characteristicId":425,"templateId":28,"value":"N/A"},"427":{"id":1816,"characteristicId":427,"templateId":28,"value":"N/A"},"429":{"id":1817,"characteristicId":429,"templateId":28,"value":"N/A"},"431":{"id":1818,"characteristicId":431,"templateId":28,"value":"N/A"},"433":{"id":1819,"characteristicId":433,"templateId":28,"value":"N/A"},"435":{"id":1820,"characteristicId":435,"templateId":28,"value":"N/A"},"437":{"id":1821,"characteristicId":437,"templateId":28,"value":"N/A"},"672":{"id":2859,"characteristicId":672,"templateId":28,"value":"N/A"},"674":{"id":2860,"characteristicId":674,"templateId":28,"value":true},"676":{"id":2861,"characteristicId":676,"templateId":28,"value":"N/A"},"678":{"id":2862,"characteristicId":678,"templateId":28,"value":"N/A"}}}},{"id":1648,"logoURL":"https://old.b4r.io/fileadmin/user_upload/GuardiCore.png","logo":true,"scheme":false,"title":"GuardiCore Centra Security Platform","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"alias":"guardicore-centra-security-platform","companyTypes":[],"description":"<span style=\"font-weight: bold;\">Reveal Application Flows Across the Infrastructure</span>\r\n<ul> <li>Automatically discover applications and flows</li> <li>Quickly understand application behavior</li> <li>Granular visibility down to the process level</li> </ul>\r\n<span style=\"font-weight: bold;\">Segment with a Powerful Policy Engine</span>\r\n<ul> <li>Define segmentation policies in minutes</li> <li>Automatic policy recommendations</li> <li>Consistent policy expression across any environment</li> </ul>\r\n<span style=\"font-weight: bold;\"><br /></span> <span style=\"font-weight: bold;\">Detect Threats Faster and Simplify Response</span>\r\n<ul> <li>Multiple detection methods cover all types of threats</li> <li>Dynamic deception immediately traps attackers</li> <li>High quality, in-context security incidents with mitigation recommendations to speed incident response</li> </ul>\r\n<span style=\"font-weight: bold;\"><br /></span> <span style=\"font-weight: bold;\">Protection For Your Entire Infrastructure, Built and Proven for Cloud Scale</span> <span style=\"font-weight: bold;\"><br /></span>\r\n<ul> <li>Hybrid Cloud. Workload protection in hybrid cloud environments that span on-premises workloads, VMs, containers and deployments in public cloud IaaS including AWS, Azure and GCP.</li> <li>Simplify Security. Simplify security management with one platform that provides flow visibility, micro-segmentation, threat detection and incident response.</li> <li>Enterprise Scalability. Scalable to meet the performance and security requirements of any sized environment</li> </ul>","shortDescription":"GuardiCore Centra Security Platform Designed to Detect Threats and Lateral Movements with Greater Visibility and Micro-Segmentation","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":3,"sellingCount":16,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"GuardiCore Centra Security Platform","keywords":"with, Simplify, security, policy, Cloud, that, response, cloud","description":"Reveal Application Flows Across the Infrastructure\r Automatically discover applications and flows Quickly understand application behavior Granular visibility","og:title":"GuardiCore Centra Security Platform","og:description":"Reveal Application Flows Across the Infrastructure\r Automatically discover applications and flows Quickly understand application behavior Granular visibility","og:image":"https://old.b4r.io/fileadmin/user_upload/GuardiCore.png"},"eventUrl":"","translationId":1649,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":199,"title":"Deception Techniques and Honeypots","alias":"deception-techniques-and-honeypots","description":"","materialsDescription":""}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[],"valuesByTemplateId":{"28":{"403":{"id":1750,"characteristicId":403,"templateId":28,"value":"N/A"},"405":{"id":1751,"characteristicId":405,"templateId":28,"value":"N/A"},"407":{"id":1752,"characteristicId":407,"templateId":28,"value":"N/A"},"409":{"id":1753,"characteristicId":409,"templateId":28,"value":"N/A"},"411":{"id":1754,"characteristicId":411,"templateId":28,"value":"N/A"},"413":{"id":1755,"characteristicId":413,"templateId":28,"value":"N/A"},"415":{"id":1756,"characteristicId":415,"templateId":28,"value":"N/A"},"417":{"id":1757,"characteristicId":417,"templateId":28,"value":true},"419":{"id":1758,"characteristicId":419,"templateId":28,"value":true},"421":{"id":1759,"characteristicId":421,"templateId":28,"value":"N/A"},"423":{"id":1760,"characteristicId":423,"templateId":28,"value":true},"425":{"id":1761,"characteristicId":425,"templateId":28,"value":"N/A"},"427":{"id":1762,"characteristicId":427,"templateId":28,"value":"N/A"},"429":{"id":1763,"characteristicId":429,"templateId":28,"value":"N/A"},"431":{"id":1764,"characteristicId":431,"templateId":28,"value":"N/A"},"433":{"id":1765,"characteristicId":433,"templateId":28,"value":"N/A"},"435":{"id":1766,"characteristicId":435,"templateId":28,"value":"N/A"},"437":{"id":1767,"characteristicId":437,"templateId":28,"value":"AWS, Azure, OpenStack, SaaS available"}}}},{"id":1656,"logoURL":"https://old.b4r.io/fileadmin/user_upload/Smokescreen.png","logo":true,"scheme":false,"title":"IllusionBLACK","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"alias":"illusionblack","companyTypes":[],"description":"Stop Advanced Cyber Threats With Deception Technology By deploying hundreds of unique deception tripwires, IllusionBLACK maximises attack detection through the kill-chain, even against stealthy, targeted campaigns that don’t involve malware. From targeted threat intelligence of an impending attack, to detecting lateral movement in every single subnet, Smokescreen’s deception technology helps turn the tables on apex attackers. <span style=\"font-weight: bold;\">Full Kill-Chain Coverage</span> IllusionBLACK decoys detect pre-attack reconnaissance, spear-phishing attacks, privilege escalation, lateral movement and data-theft. <span style=\"font-weight: bold;\">Deep Network Visibility</span> Instantly deploy 100's of individually unique, customisable traps across all your endpoints and in every single subnet of your network. <span style=\"font-weight: bold;\">Attack Vector Agnostic</span> Deception does not rely on static signatures or heuristics to identify attacks, so it stays effective no matter what the bad guys try tomorrow. IllusionBLACK detects threats no matter what they attack It has advanced 3rd generation deception features, including…\r\n<ul>\r\n<li>MirageMaker™. Realistic auto-created decoy data fills deceptive assets with always unique, instantly changing content.</li>\r\n<li>ThreatParse™. Natural language attack reconstruction parses raw attack data into plain-English attack analysis.</li>\r\n<li>Automated triage. Agentless investigation of compromised endpoints to reduce root cause analysis time and capture volatile forensic information.</li>\r\n<li>WebDeflect™. Integrate deception into any web or mobile application to guard against business logic attacks.</li>\r\n<li>ThreatDeflect™. Redirect attacks to decoy cloud environments to keep attackers engaged while containment kicks in.</li>\r\n<li>Forensic preservation. All evidence recorded and preserved for further analysis in industry standard formats.</li>\r\n<li>Smart Integrations. Logic-driven automatic response and orchestration to execute response strategies at wire-speed.</li>\r\n<li>Hardened BSD UNIX base. Rock-solid security built for highly-targeted environments, coupled with BSD UNIX's legendary reliability.</li>\r\n<li>Threat intelligence export. Machine consumable through STIX, JSON and CSV, as well as integrations with other security infrastructure.</li>\r\n</ul>\r\n","shortDescription":"IllusionBLACK features rapid out-of-band deployment, no performance impact, enterprise scalability, and minimal false positives","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":3,"sellingCount":7,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"IllusionBLACK","keywords":"attack, deception, IllusionBLACK, attacks, analysis, unique, with, response","description":"Stop Advanced Cyber Threats With Deception Technology By deploying hundreds of unique deception tripwires, IllusionBLACK maximises attack detection through the","og:title":"IllusionBLACK","og:description":"Stop Advanced Cyber Threats With Deception Technology By deploying hundreds of unique deception tripwires, IllusionBLACK maximises attack detection through the","og:image":"https://old.b4r.io/fileadmin/user_upload/Smokescreen.png"},"eventUrl":"","translationId":1657,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":199,"title":"Deception Techniques and Honeypots","alias":"deception-techniques-and-honeypots","description":"","materialsDescription":""}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[],"valuesByTemplateId":{"28":{"403":{"id":1822,"characteristicId":403,"templateId":28,"value":true},"405":{"id":1823,"characteristicId":405,"templateId":28,"value":"N/A"},"407":{"id":1824,"characteristicId":407,"templateId":28,"value":"N/A"},"409":{"id":1825,"characteristicId":409,"templateId":28,"value":true},"411":{"id":1826,"characteristicId":411,"templateId":28,"value":"N/A"},"413":{"id":1827,"characteristicId":413,"templateId":28,"value":"N/A"},"415":{"id":1828,"characteristicId":415,"templateId":28,"value":true},"417":{"id":1829,"characteristicId":417,"templateId":28,"value":true},"419":{"id":1830,"characteristicId":419,"templateId":28,"value":true},"421":{"id":1831,"characteristicId":421,"templateId":28,"value":true},"423":{"id":1832,"characteristicId":423,"templateId":28,"value":true},"425":{"id":1833,"characteristicId":425,"templateId":28,"value":"N/A"},"427":{"id":1834,"characteristicId":427,"templateId":28,"value":"N/A"},"429":{"id":1835,"characteristicId":429,"templateId":28,"value":"N/A"},"431":{"id":1836,"characteristicId":431,"templateId":28,"value":"N/A"},"433":{"id":1837,"characteristicId":433,"templateId":28,"value":true},"435":{"id":1838,"characteristicId":435,"templateId":28,"value":"N/A"},"437":{"id":1839,"characteristicId":437,"templateId":28,"value":"N/A"},"672":{"id":2863,"characteristicId":672,"templateId":28,"value":"N/A"},"674":{"id":2864,"characteristicId":674,"templateId":28,"value":"N/A"},"676":{"id":2865,"characteristicId":676,"templateId":28,"value":"N/A"},"678":{"id":2866,"characteristicId":678,"templateId":28,"value":"N/A"}}}},{"id":1650,"logoURL":"https://old.b4r.io/fileadmin/user_upload/illusive_networks.jpg","logo":true,"scheme":false,"title":"Illusive Platform","vendorVerified":0,"rating":"1.00","implementationsCount":0,"suppliersCount":0,"alias":"illusive-platform","companyTypes":[],"description":"Strengthen your resistance and—when attackers get in—cut them off before they reach your critical assets. Rapid, Sustainable Reduction of Cyber Attack Risk <span style=\"font-weight: bold;\">Protection from Targeted Attacks</span> The Illusive platform is purpose-built to counter the methods of advanced attackers—while also alleviating burden on security teams. Illusive’s featherweight solution helps you:\r\n<ul>\r\n<li>Understand your attack risk posture</li>\r\n<li>Harden the environment</li>\r\n<li>Detect attackers early</li>\r\n<li>Resolve incidents before attackers succeed</li>\r\n</ul>\r\n<span style=\"font-weight: bold;\">See Your World as an Attacker Would</span> Attackers want to know how they can advance from one system to another and where to find your coveted crown jewels. Attacker View maps your network as the attacker wants to see it—putting you steps ahead. Illusive’s Risk Dashboard analyzes how susceptible you are to a targeted attack and helps you improve the protective power of your deception environment.","shortDescription":"Illusive Platform proactively stop targeted attacks and Advanced Persistent Threats (APTs). Strengthen your resistance and—when attackers get in—cut them off before they reach your critical assets.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":8,"sellingCount":5,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Illusive Platform","keywords":"your, attackers, from, Risk, Illusives, Illusive, Attacker, environment","description":"Strengthen your resistance and—when attackers get in—cut them off before they reach your critical assets. Rapid, Sustainable Reduction of Cyber","og:title":"Illusive Platform","og:description":"Strengthen your resistance and—when attackers get in—cut them off before they reach your critical assets. Rapid, Sustainable Reduction of Cyber","og:image":"https://old.b4r.io/fileadmin/user_upload/illusive_networks.jpg"},"eventUrl":"","translationId":1651,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":199,"title":"Deception Techniques and Honeypots","alias":"deception-techniques-and-honeypots","description":"","materialsDescription":""}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[],"valuesByTemplateId":{"28":{"403":{"id":1768,"characteristicId":403,"templateId":28,"value":true},"405":{"id":1769,"characteristicId":405,"templateId":28,"value":"N/A"},"407":{"id":1770,"characteristicId":407,"templateId":28,"value":"N/A"},"409":{"id":1771,"characteristicId":409,"templateId":28,"value":"N/A"},"411":{"id":1772,"characteristicId":411,"templateId":28,"value":"N/A"},"413":{"id":1773,"characteristicId":413,"templateId":28,"value":"N/A"},"415":{"id":1774,"characteristicId":415,"templateId":28,"value":"N/A"},"417":{"id":1775,"characteristicId":417,"templateId":28,"value":true},"419":{"id":1776,"characteristicId":419,"templateId":28,"value":true},"421":{"id":1777,"characteristicId":421,"templateId":28,"value":"N/A"},"423":{"id":1778,"characteristicId":423,"templateId":28,"value":true},"425":{"id":1779,"characteristicId":425,"templateId":28,"value":"N/A"},"427":{"id":1780,"characteristicId":427,"templateId":28,"value":"N/A"},"429":{"id":1781,"characteristicId":429,"templateId":28,"value":"N/A"},"431":{"id":1782,"characteristicId":431,"templateId":28,"value":"N/A"},"433":{"id":1783,"characteristicId":433,"templateId":28,"value":"N/A"},"435":{"id":1784,"characteristicId":435,"templateId":28,"value":"N/A"},"437":{"id":1785,"characteristicId":437,"templateId":28,"value":"N/A"}}}},{"id":1724,"logoURL":"https://old.b4r.io/fileadmin/user_upload/TrapX_DeceptionGrid_platform.png","logo":true,"scheme":false,"title":"TrapX DeceptionGrid platform","vendorVerified":0,"rating":"3.30","implementationsCount":9,"suppliersCount":0,"alias":"trapx-deceptiongrid-platform1","companyTypes":[],"description":"<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">The TrapX DeceptionGrid platform protects your valuable assets against a multitude of attacks including malicious insiders and sophisticated cybercriminals.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">The Deception Product of Choice</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">DeceptionGrid’s depth and breadth of deception capability is unmatched. Our powerful architecture presents the deception attack surfaces that best match attacker activity. Learn more below.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Console with Attack Visualization</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">New expanded visualization enables the security operations team to rapidly understand the activities of the attacker over time, from the originating intrusion to the assets they are engaging with, to the final containment.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Attacker ID</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">New attack identification automatically determines if an attack is being conducted by a human attacker, or automated attack tools, giving security teams a better understanding of the attack and subsequent containment methods.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Automated Provisioning</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\"> Automated Provision of Deception Components. DeceptionGrid scans your existing network and provisions hundreds-to-thousands of deception components including Tokens (lures) and Traps (decoys).</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Deception Tokens</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Deception Tokens (lures) appear as ordinary files, scripts and databases, are embedded within real IT assets to bait and divert attackers.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Active Traps</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">New active traps functionality creates a stream of false network traffic between deployed traps to confuse and divert attackers that monitor the network traffic.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Emulated Traps</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Medium Interaction Emulated Traps</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Our patented emulated traps can be deployed at the largest enterprise scale through automation. You can select from a wide variety of servers, databases, workstations, switches, routers and more.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Industry Templates</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">The patented medium interaction traps now include expanded templates for specialized devices based on industries. These templates include, ATM’s and SWIFT assets for financial services, or Point of Sale (PoS) devices for retail, as well as devices for medical, manufacturing and many more, allowing customers to determine if attackers are targeting specialized devices that are often vulnerable to attack.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">FullOS Traps</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">High Interaction (Full Operating System) Traps</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">DeceptionGrid enables the provision of full operating system (fullOS) traps. Our medium interaction traps automatically extend engaged attackers through our smart deception to our fullOS decoys for the deepest attacker diversion and engagement. FullOS traps also enable customers to clone existing assets – you can completely replicate actual production servers to further deceive attackers.</span>\r\n","shortDescription":"The TrapX DeceptionGrid protects your valuable assets against a multitude of attacks including malicious insiders, lateral-movement, Advanced Persistent Threats (APTs) and sophisticated cybercriminals","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":12,"sellingCount":8,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"DeceptionGrid protects your valuable assets against a multitude of attacks including malicious insiders, lateral-movement","keywords":"from, TrapX, DeceptionGrid, breach, attack, platform, intelligence, remediation, protects, assets, malicious insiders, lateral-movement, Advanced Persistent Threats (APTs), sophisticated cybercriminals, Console, Attack Visualization, security operations team, intrusion, Attacker ID, attack identification, human attacker, automated attack tools, security teams, Automated Provisioning, Deception Tokens, Active Traps, Emulated Traps, Medium Interaction Emulated Traps, FullOS Traps, High Interaction (Full Operating System) Traps","description":"The TrapX DeceptionGrid platform protects your valuable assets against a multitude of attacks including malicious insiders and sophisticated cybercriminals.","og:title":"DeceptionGrid protects your valuable assets against a multitude of attacks including malicious insiders, lateral-movement","og:description":"The TrapX DeceptionGrid platform protects your valuable assets against a multitude of attacks including malicious insiders and sophisticated cybercriminals.","og:image":"https://old.b4r.io/fileadmin/user_upload/TrapX_DeceptionGrid_platform.png"},"eventUrl":"","translationId":1723,"dealDetails":{"avgPartnerDiscount":30,"dealProtection":1,"avgDealSize":30000,"dealSizeCurrency":"","avgDealClosing":3},"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"It is required to transfer the customer data to the vendor in order to receive a testing version for 30 days","categories":[{"id":199,"title":"Deception Techniques and Honeypots","alias":"deception-techniques-and-honeypots","description":"","materialsDescription":""},{"id":204,"title":"Managed Detection and Response","alias":"managed-detection-and-response","description":"","materialsDescription":""}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[],"valuesByTemplateId":{"28":{"403":{"id":2441,"characteristicId":403,"templateId":28,"value":true},"405":{"id":2442,"characteristicId":405,"templateId":28,"value":true},"407":{"id":2443,"characteristicId":407,"templateId":28,"value":"N/A"},"409":{"id":2444,"characteristicId":409,"templateId":28,"value":"N/A"},"411":{"id":2445,"characteristicId":411,"templateId":28,"value":true},"413":{"id":2446,"characteristicId":413,"templateId":28,"value":true},"415":{"id":2447,"characteristicId":415,"templateId":28,"value":true},"417":{"id":2448,"characteristicId":417,"templateId":28,"value":true},"419":{"id":2449,"characteristicId":419,"templateId":28,"value":true},"421":{"id":2450,"characteristicId":421,"templateId":28,"value":true},"423":{"id":2451,"characteristicId":423,"templateId":28,"value":true},"425":{"id":2452,"characteristicId":425,"templateId":28,"value":true},"427":{"id":2453,"characteristicId":427,"templateId":28,"value":true},"429":{"id":2454,"characteristicId":429,"templateId":28,"value":true},"431":{"id":2455,"characteristicId":431,"templateId":28,"value":true},"433":{"id":2456,"characteristicId":433,"templateId":28,"value":true},"435":{"id":2457,"characteristicId":435,"templateId":28,"value":true},"437":{"id":2458,"characteristicId":437,"templateId":28,"value":"AWS, Azure, OpenStack"},"672":{"id":2842,"characteristicId":672,"templateId":28,"value":true},"674":{"id":2843,"characteristicId":674,"templateId":28,"value":true},"676":{"id":2844,"characteristicId":676,"templateId":28,"value":true},"678":{"id":2845,"characteristicId":678,"templateId":28,"value":true}}}}],"selectedTemplateId":28},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}