{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"implementations":{"categories":{"en":"Categories","ru":"Категории","_type":"localeString"},"more":{"ru":"Узнать больше","_type":"localeString","en":"Learn more"},"sort-title-asc":{"_type":"localeString","en":"From A to Z","ru":"От А до Я"},"sort-title-desc":{"_type":"localeString","en":"From Z to A","ru":"от Я до А"},"sort-rating-asc":{"ru":"По возрастанию рейтинга","_type":"localeString","en":"Rating ascending"},"sort-rating-desc":{"en":"Rating descending","ru":"По убыванию рейтинга","_type":"localeString"},"sort-discount-asc":{"ru":"По возрастанию скидки","_type":"localeString","en":"Rebate ascending"},"sort-discount-desc":{"en":"Rebate descending","ru":"По убыванию скидки","_type":"localeString"},"user":{"_type":"localeString","en":"User","ru":"Пользователь"},"vendor":{"en":"Vendor","ru":"Производитель","_type":"localeString"},"supplier":{"ru":"Поставщик","_type":"localeString","en":"Supplier"},"status":{"_type":"localeString","en":"Status","ru":"Статус"},"product":{"ru":"Продукт","_type":"localeString","en":"Product"},"no-results":{"en":"No results found. We didn't find any results with the filter you selected.","ru":"По вашему запросу ничего не найдено, попробуйте изменить запрос.","_type":"localeString"},"with-reference":{"ru":"С референсом","_type":"localeString","en":"With reference"},"items-found":{"ru":"Внедрений найдено","_type":"localeString","en":"Deployments found"},"canceled":{"ru":"Отменено","_type":"localeString","en":"Canceled"},"deal-canceled":{"ru":"Сделка отменена","_type":"localeString","en":"Deal canceled"},"deal-closed":{"ru":"Сделка закрыта","_type":"localeString","en":"Deal closed"},"deal-in-progress":{"ru":"Сделка в процессе","_type":"localeString","en":"Deal in progress"},"deal-is-planned":{"ru":"Сделка планируется","_type":"localeString","en":"Deal is planned"},"finished":{"en":"Finished","ru":"Завершено","_type":"localeString"},"in-process":{"ru":"Ведется","_type":"localeString","en":"In Process"},"planned":{"_type":"localeString","en":"Planned","ru":"Планируется"},"proof-of-concept":{"_type":"localeString","en":"Proof of concept","ru":"Пилотный проект"},"stopped":{"ru":"Остановлено","_type":"localeString","en":"Stopped"},"date":{"en":"Deployment date","ru":"Дата внедрения","_type":"localeString"},"roi":{"en":"ROI","ru":"ROI","_type":"localeString"},"implementations-fetching-error":{"_type":"localeString","en":"An error has occurred. Please reload the page.","ru":"Произошла ошибка. Перезагрузите пожалуйста страницу."}},"header":{"help":{"_type":"localeString","en":"Help","de":"Hilfe","ru":"Помощь"},"how":{"de":"Wie funktioniert es","ru":"Как это работает","_type":"localeString","en":"How does it works"},"login":{"_type":"localeString","en":"Log in","de":"Einloggen","ru":"Вход"},"logout":{"_type":"localeString","en":"logout","ru":"Выйти"},"faq":{"en":"FAQ","de":"FAQ","ru":"FAQ","_type":"localeString"},"references":{"ru":"Мои запросы","_type":"localeString","en":"Requests","de":"References"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find-it-product":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"autoconfigurator":{"en":" Price calculator","ru":"Калькулятор цены","_type":"localeString"},"comparison-matrix":{"_type":"localeString","en":"Comparison Matrix","ru":"Матрица сравнения"},"roi-calculators":{"ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"b4r":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"business-booster":{"_type":"localeString","en":"Business boosting","ru":"Развитие бизнеса"},"catalogs":{"ru":"Каталоги","_type":"localeString","en":"Catalogs"},"products":{"ru":"Продукты","_type":"localeString","en":"Products"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"companies":{"en":"Companies","ru":"Компании","_type":"localeString"},"categories":{"en":"Categories","ru":"Категории","_type":"localeString"},"for-suppliers":{"_type":"localeString","en":"For suppliers","ru":"Поставщикам"},"blog":{"ru":"Блог","_type":"localeString","en":"Blog"},"agreements":{"_type":"localeString","en":"Deals","ru":"Сделки"},"my-account":{"ru":"Мой кабинет","_type":"localeString","en":"My account"},"register":{"ru":"Зарегистрироваться","_type":"localeString","en":"Register"},"comparison-deletion":{"en":"Deletion","ru":"Удаление","_type":"localeString"},"comparison-confirm":{"en":"Are you sure you want to delete","ru":"Подтвердите удаление","_type":"localeString"},"search-placeholder":{"ru":"Введите поисковый запрос","_type":"localeString","en":"Enter your search term"},"my-profile":{"en":"My Profile","ru":"Мои Данные","_type":"localeString"},"about":{"_type":"localeString","en":"About Us"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter"},"roi4webinar":{"_type":"localeString","en":"Roi4Webinar"},"sub_it_catalogs":{"_type":"localeString","en":"Find IT product"},"sub_b4reference":{"en":"Get reference from user","_type":"localeString"},"sub_roi4presenter":{"en":"Make online presentations","_type":"localeString"},"sub_roi4webinar":{"_type":"localeString","en":"Create an avatar for the event"},"catalogs_new":{"en":"Products","_type":"localeString"},"b4reference":{"en":"Bonus4Reference","_type":"localeString"},"it_products":{"en":"Find and compare IT products","_type":"localeString"},"it_implementations":{"en":"Learn implementation reviews","_type":"localeString"},"it_companies":{"_type":"localeString","en":"Find vendor and company-supplier"},"it_categories":{"_type":"localeString","en":"Calculate ROI and price"},"it_our_products":{"en":"Our Products","_type":"localeString"},"it_it_catalogs":{"en":"IT catalogs","_type":"localeString"}},"footer":{"copyright":{"ru":"Все права защищены","_type":"localeString","en":"All rights reserved","de":"Alle rechte vorbehalten"},"company":{"en":"My Company","de":"Über die Firma","ru":"О компании","_type":"localeString"},"about":{"ru":"О нас","_type":"localeString","en":"About us","de":"Über uns"},"infocenter":{"_type":"localeString","en":"Infocenter","de":"Infocenter","ru":"Инфоцентр"},"tariffs":{"de":"Tarife","ru":"Тарифы","_type":"localeString","en":"Subscriptions"},"contact":{"ru":"Связаться с нами","_type":"localeString","en":"Contact us","de":"Kontaktiere uns"},"marketplace":{"ru":"Marketplace","_type":"localeString","en":"Marketplace","de":"Marketplace"},"products":{"de":"Produkte","ru":"Продукты","_type":"localeString","en":"Products"},"compare":{"de":"Wähle und vergleiche","ru":"Подобрать и сравнить","_type":"localeString","en":"Pick and compare"},"calculate":{"en":"Calculate the cost","de":"Kosten berechnen","ru":"Расчитать стоимость","_type":"localeString"},"get_bonus":{"en":"Bonus for reference","de":"Holen Sie sich einen Rabatt","ru":"Бонус за референс","_type":"localeString"},"salestools":{"_type":"localeString","en":"Salestools","de":"Salestools","ru":"Salestools"},"automatization":{"ru":"Автоматизация расчетов","_type":"localeString","en":"Settlement Automation","de":"Abwicklungsautomatisierung"},"roi_calcs":{"ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators","de":"ROI-Rechner"},"matrix":{"ru":"Матрица сравнения","_type":"localeString","en":"Comparison matrix","de":"Vergleichsmatrix"},"b4r":{"de":"Rebate 4 Reference","ru":"Rebate 4 Reference","_type":"localeString","en":"Rebate 4 Reference"},"our_social":{"en":"Our social networks","de":"Unsere sozialen Netzwerke","ru":"Наши социальные сети","_type":"localeString"},"subscribe":{"en":"Subscribe to newsletter","de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку","_type":"localeString"},"subscribe_info":{"_type":"localeString","en":"and be the first to know about promotions, new features and recent software reviews","ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта"},"policy":{"ru":"Политика конфиденциальности","_type":"localeString","en":"Privacy Policy"},"user_agreement":{"ru":"Пользовательское соглашение ","_type":"localeString","en":"Agreement"},"solutions":{"en":"Solutions","ru":"Возможности","_type":"localeString"},"find":{"en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта","_type":"localeString"},"quote":{"en":"Price calculator","ru":"Калькулятор цены","_type":"localeString"},"boosting":{"en":"Business boosting","ru":"Развитие бизнеса","_type":"localeString"},"4vendors":{"ru":"поставщикам","_type":"localeString","en":"4 vendors"},"blog":{"ru":"блог","_type":"localeString","en":"blog"},"pay4content":{"_type":"localeString","en":"we pay for content","ru":"платим за контент"},"categories":{"_type":"localeString","en":"categories","ru":"категории"},"showForm":{"ru":"Показать форму","_type":"localeString","en":"Show form"},"subscribe__title":{"_type":"localeString","en":"We send a digest of actual news from the IT world once in a month!","ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!"},"subscribe__email-label":{"_type":"localeString","en":"Email","ru":"Email"},"subscribe__name-label":{"_type":"localeString","en":"Name","ru":"Имя"},"subscribe__required-message":{"ru":"Это поле обязательное","_type":"localeString","en":"This field is required"},"subscribe__notify-label":{"_type":"localeString","en":"Yes, please, notify me about news, events and propositions","ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях"},"subscribe__agree-label":{"_type":"localeString","en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data","ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*"},"subscribe__submit-label":{"ru":"Подписаться","_type":"localeString","en":"Subscribe"},"subscribe__email-message":{"_type":"localeString","en":"Please, enter the valid email","ru":"Пожалуйста, введите корректный адрес электронной почты"},"subscribe__email-placeholder":{"en":"username@gmail.com","ru":"username@gmail.com","_type":"localeString"},"subscribe__name-placeholder":{"ru":"Имя Фамилия","_type":"localeString","en":"Last, first name"},"subscribe__success":{"en":"You are successfully subscribed! Check you mailbox.","ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString"},"subscribe__error":{"en":"Subscription is unsuccessful. Please, try again later.","ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее.","_type":"localeString"},"roi4presenter":{"en":"Roi4Presenter","de":"roi4presenter","ru":"roi4presenter","_type":"localeString"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4webinar":{"en":"Pitch Avatar","_type":"localeString"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"}},"breadcrumbs":{"home":{"ru":"Главная","_type":"localeString","en":"Home"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"products":{"en":"Products","ru":"Продукты","_type":"localeString"},"implementations":{"_type":"localeString","en":"Deployments","ru":"Внедрения"},"login":{"ru":"Вход","_type":"localeString","en":"Login"},"registration":{"ru":"Регистрация","_type":"localeString","en":"Registration"},"b2b-platform":{"en":"B2B platform for IT buyers, vendors and suppliers","ru":"Портал для покупателей, поставщиков и производителей ИТ","_type":"localeString"}},"comment-form":{"title":{"ru":"Оставить комментарий","_type":"localeString","en":"Leave comment"},"firstname":{"ru":"Имя","_type":"localeString","en":"First name"},"lastname":{"_type":"localeString","en":"Last name","ru":"Фамилия"},"company":{"ru":"Компания","_type":"localeString","en":"Company name"},"position":{"ru":"Должность","_type":"localeString","en":"Position"},"actual-cost":{"_type":"localeString","en":"Actual cost","ru":"Фактическая стоимость"},"received-roi":{"ru":"Полученный ROI","_type":"localeString","en":"Received ROI"},"saving-type":{"ru":"Тип экономии","_type":"localeString","en":"Saving type"},"comment":{"en":"Comment","ru":"Комментарий","_type":"localeString"},"your-rate":{"ru":"Ваша оценка","_type":"localeString","en":"Your rate"},"i-agree":{"ru":"Я согласен","_type":"localeString","en":"I agree"},"terms-of-use":{"ru":"С пользовательским соглашением и политикой конфиденциальности","_type":"localeString","en":"With user agreement and privacy policy"},"send":{"en":"Send","ru":"Отправить","_type":"localeString"},"required-message":{"ru":"{NAME} - это обязательное поле","_type":"localeString","en":"{NAME} is required filed"}},"maintenance":{"title":{"_type":"localeString","en":"Site under maintenance","ru":"На сайте проводятся технические работы"},"message":{"en":"Thank you for your understanding","ru":"Спасибо за ваше понимание","_type":"localeString"}},"filters":{"from":{"_type":"localeString","en":"from","ru":"от"},"to":{"en":"to","ru":"до","_type":"localeString"},"filter-price-title":{"en":"Filter by price","ru":"Фильтр по цене","_type":"localeString"},"view-type-label":{"ru":"Вид","_type":"localeString","en":"View"},"sort-type-label":{"_type":"localeString","en":"Sorting","ru":"Сортировка"},"category":{"ru":"Категория","_type":"localeString","en":"Category"},"follow":{"ru":"Следить","_type":"localeString","en":"Follow"},"add-product":{"en":"Add Product","ru":"Добавить продукт","_type":"localeString"},"show-all":{"en":"Show all","ru":"Показать все","_type":"localeString"},"filter-toggle":{"_type":"localeString","en":"Filter","ru":"Фильтр"},"clear-button":{"_type":"localeString","en":"Сlear","ru":"Очистить"},"delivery-type-field":{"en":"Delivery type","ru":"Тип поставки","_type":"localeString"},"product-categories-field":{"ru":"категориz продуктаhjle","_type":"localeString","en":"product categories"},"providers-field":{"_type":"localeString","en":"Providers","ru":"Поставщик, производитель"},"business-tasks-field":{"_type":"localeString","en":"Business tasks","ru":"Бизнес задачи"},"problems-field":{"ru":"Проблемы","_type":"localeString","en":"Problems"},"with-discounts-checkbox":{"ru":"Со скидками","_type":"localeString","en":"With discounts"},"expert-price-checkbox":{"ru":"Конфигуратор","_type":"localeString","en":"Configurator"},"roi-calculator-checkbox":{"en":"ROI-calculator","ru":"ROI-калькулятор","_type":"localeString"},"apply-filter-button":{"_type":"localeString","en":"Apply filter","ru":"Применить фильтр"},"sorting-toggle":{"_type":"localeString","en":"Sorting","ru":"Сортировка"},"show-all-button":{"ru":"Показать все","_type":"localeString","en":"Show all"},"suggest-product-button":{"ru":"Предложить продукт","_type":"localeString","en":"Suggest product"},"with-projects-label":{"en":"With deployments","ru":"С внедрениями","_type":"localeString"},"bonus-4-reference":{"_type":"localeString","en":"Bonus 4 Reference","ru":"Бонус за референс"},"product-categories":{"ru":"Категории продуктов","_type":"localeString","en":"Product Categories"},"countries":{"en":"Countries","ru":"Страны","_type":"localeString"},"seller":{"en":"Seller","ru":"Продавец","_type":"localeString"},"vendors":{"ru":"Производители продуктов пользователя","_type":"localeString","en":"User products vendors"},"suppliers":{"_type":"localeString","en":"User suppliers","ru":"Поставщики пользователя"},"business-process":{"_type":"localeString","en":"Problems","ru":"Проблемы"},"business-objectives":{"en":"Business tasks","ru":"Бизнес задачи","_type":"localeString"},"branch":{"ru":"Отрасль","_type":"localeString","en":" Branch"},"users":{"en":"Users","ru":"Пользователи","_type":"localeString"},"status":{"ru":"Статус","_type":"localeString","en":"Status"},"info-source":{"ru":"Информационный ресурс","_type":"localeString","en":"Info source"},"with-reference-checkbox":{"_type":"localeString","en":"With reference","ru":"С референсами"},"show-deal-checkbox":{"ru":"Показывать сделки с noname","_type":"localeString","en":"Show deal with noname"},"roi-checkbox":{"ru":"ROI","_type":"localeString","en":"ROI"},"problems":{"ru":"Проблемы","_type":"localeString","en":"Problems"},"find":{"ru":"Выполнить поиск","_type":"localeString","en":"Find"},"deal-date":{"en":"Date","ru":"Дата","_type":"localeString"},"try-button":{"_type":"localeString","en":"Try AI (Beta)","ru":"Попробовать AI (Beta)"},"hide":{"ru":"Скрыть","_type":"localeString","en":"Hide"},"company-size":{"_type":"localeString","en":"Company size","ru":"Размер компании"},"add-company":{"ru":"Добавить компанию","_type":"localeString","en":"Add company"},"add-implementation":{"ru":"Добавить внедрение","_type":"localeString","en":"Add deployment"},"sort-title-asc":{"ru":"От А до Я","_type":"localeString","en":"From A to Z"},"sort-title-desc":{"_type":"localeString","en":"From Z to A","ru":"От Я до А"},"sellers-field":{"_type":"localeString","en":"Sellers","ru":"Поставщики, Производители"},"supply-types":{"en":"Supply type","ru":"Тип поставки","_type":"localeString"},"with-comments-checkbox":{"ru":"С комментариями","_type":"localeString","en":"With comments"},"supplier":{"en":"Supplier","ru":"Поставщик","_type":"localeString"},"vendor":{"_type":"localeString","en":"Vendor","ru":"Производитель"},"user":{"_type":"localeString","en":"User","ru":"Пользователь"},"company-type":{"_type":"localeString","en":"Company type","ru":"Тип компании"},"partners-field":{"ru":" Партнеры","_type":"localeString","en":"Partners"},"customers":{"ru":"Покупатели","_type":"localeString","en":"Customers"},"product-supplier":{"_type":"localeString","en":"Product supplier","ru":"Поставщик продукта"},"product-vendor":{"_type":"localeString","en":"Product vendor","ru":"Производитель продукта"},"implementation-date":{"en":"Deployment date","ru":"Дата внедрения","_type":"localeString"},"canceled":{"ru":"Отменено","_type":"localeString","en":"Canceled"},"deal-canceled":{"en":"Deal canceled","ru":"Сделка отменена","_type":"localeString"},"deal-closed":{"_type":"localeString","en":"Deal closed","ru":"Сделка закрыта"},"deal-in-progress":{"ru":"Сделка в процессе","_type":"localeString","en":"Deal in progress"},"deal-is-planned":{"_type":"localeString","en":"Deal is planned","ru":"Сделка планируется"},"finished":{"ru":"Завершено","_type":"localeString","en":"Finished"},"in-process":{"ru":"Ведется","_type":"localeString","en":"In Process"},"planned":{"_type":"localeString","en":"Planned","ru":"Планируется"},"proof-of-concept":{"_type":"localeString","en":"Proof of concept","ru":"Пилотный проект"},"stopped":{"ru":"Остановлено","_type":"localeString","en":"Stopped"},"competencies":{"ru":"Компетенции","_type":"localeString","en":"Competencies"}}},"translationsStatus":{"implementations":"success","filters":"success"},"sections":{"implementations-text-block":{"label":"catalog-implementations-text-block","body":{"ru":[{"style":"normal","_key":"1435aa042111","markDefs":[],"children":[{"_key":"1435aa0421110","_type":"span","marks":[],"text":"Каталог внедрений ROI4CIO - это база данных о внедрениях программного обеспечения, оборудования и ИТ-услуг. Находите внедрения по вендору, поставщику, пользователю, бизнес-задачам, проблемам, статусу, фильтруйте по наличию ROI и референса."}],"_type":"block"}],"_type":"localeBlock","en":[{"children":[{"_type":"span","marks":[],"text":"The ROI4CIO Deployment Catalog is a database of software, hardware, and IT service implementations. Find implementations by vendor, supplier, user, business tasks, problems, status, filter by the presence of ROI and reference.","_key":"0e40f9075bd00"}],"_type":"block","style":"normal","_key":"0e40f9075bd0","markDefs":[]}]}}},"sectionsStatus":{"implementations-text-block":"success"},"pageMetaData":{"implementations":{"title":{"_type":"localeString","en":"ROI4CIO: Implementations","ru":"ROI4CIO: Внедрения"},"meta":[{"name":"og:image","content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg"},{"name":"og:type","content":"website"}],"translatable_meta":[{"name":"og:title","translations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"}},{"translations":{"en":"Implementations","ru":"Каталог внедрений различных видов программного обеспечения, ИТ проектов. Результаты внедрений ИТ, результаты, референсы, ROI","_type":"localeString"},"name":"og:description"},{"translations":{"ru":"Внедрения","_type":"localeString","en":"Implementations"},"name":"title"},{"translations":{"en":"Implementations description","ru":"Описание внедрений","_type":"localeString"},"name":"description"},{"name":"keywords","translations":{"en":"Implementations keywords","ru":"Внедрения ключевые слова","_type":"localeString"}}]}},"pageMetaDataStatus":{"implementations":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{"trapx-deception-grid-for-manufacturer-of-steel-products":{"id":535,"title":"TrapX Deception Grid for manufacturer of steel products","description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">The manufacturing case study focuses on one of the largest </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">manufacturers of steel products to include tubing, pipe and sheet. Assets </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">included a very large network for industrial control systems (ICS) and </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">the necessary supervisory control and data acquisition (SCADA) </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">components which run their manufacturing processes end to end. Prior </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">to our involvement, this manufacturer had routinely removed routine </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">threats but were unaware of sophisticated malware infection or advanced </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">persistent threats. The customer had a large industry suite of cyber </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">defense products which included a firewall, anti-virus suites, multiple </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">intrusion detection software products, endpoint security and other </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">software.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Immediately upon installation, the TrapX DeceptionGrid generated </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">ALERTS and identified malicious activity in two key locations. Both of </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">these were on SCADA processors which were central to the </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">manufacturing process. An attack in this area could severely disrupt </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">ongoing manufacturing processes causing both a shut-down and millions </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">of dollars in potential loss. Our analysis it was determined that both of </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">these malicious processes were communicating through TOR to their </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">attackers. In one case the malicious process was attempting to establish </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">a new command and control connection through TOR. In the other case </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">command and control was established and many types of malware were </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">resident on the station.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Broad Scale Attack Deployed Through One Entry Point</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">TrapX found several types of malware deployed in this SCADA processor. </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">TR-Dropper.Gen2.trojan allowed full access and control of the infected </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">end-point. It allows for the collection and exfiltration of confidential </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">data. Additionally we found Packed.Win32.Katusha.e malware stealing </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">passwords which was communicating back to attacker IP addresses </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">through TOR.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Over several additional weeks, DeceptionGrid detected lateral movement </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">by attackers that identified two additional command and control sites. </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">The customer coordinated with TrapX and SCADA component vendors to </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">determine the impact of the attack, to eliminate it and then to reprovision </span><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px;\">the software in all of the effected components.</span>\r\n","alias":"trapx-deception-grid-for-manufacturer-of-steel-products","roi":0,"seo":{"title":"TrapX Deception Grid for manufacturer of steel products","keywords":"control, TrapX, malware, were, which, SCADA, products, this","description":"The manufacturing case study focuses on one of the largest manufacturers of steel products to include tubing, pipe and sheet. Assets included a very","og:title":"TrapX Deception Grid for manufacturer of steel products","og:description":"The manufacturing case study focuses on one of the largest manufacturers of steel products to include tubing, pipe and sheet. Assets included a very"},"deal_info":"","user":{"id":4195,"title":"Hidden user","logoURL":"https://old.b4r.io/uploads/roi/company/hidden_user.jpg","alias":"skrytyi-polzovatel","address":"","roles":[],"description":"User Information is confidential ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":13,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hidden user","keywords":"Hidden, user, User, Information, confidential","description":"User Information is confidential ","og:title":"Hidden user","og:description":"User Information is confidential ","og:image":"https://old.b4r.io/uploads/roi/company/hidden_user.jpg"},"eventUrl":""},"supplier":{},"vendors":[{"id":3890,"title":"TrapX","logoURL":"https://old.b4r.io/uploads/roi/company/TrapX.png","alias":"trapx","address":"","roles":[],"description":"TrapX has created a new generation of deception technology that provides real-time breach detection and prevention. Our field proven solution deceives would-be attackers with turn-key decoys (traps) that “imitate” your true assets. Hundreds or thousands of traps can be deployed with little effort, creating a virtual mine field for cyberattacks, alerting you to any malicious activity with actionable intelligence immediately.","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":1,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":9,"vendorPartnersCount":0,"supplierPartnersCount":1,"b4r":0,"categories":{},"companyUrl":"https://trapx.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"TrapX","keywords":"with, TrapX, field, that, traps, little, creating, deployed","description":"TrapX has created a new generation of deception technology that provides real-time breach detection and prevention. Our field proven solution deceives would-be","og:title":"TrapX","og:description":"TrapX has created a new generation of deception technology that provides real-time breach detection and prevention. Our field proven solution deceives would-be","og:image":"https://old.b4r.io/uploads/roi/company/TrapX.png"},"eventUrl":""}],"products":[{"id":1724,"logo":false,"scheme":false,"title":"TrapX DeceptionGrid platform","vendorVerified":0,"rating":"3.30","implementationsCount":9,"suppliersCount":0,"alias":"trapx-deceptiongrid-platform1","companyTypes":[],"description":"<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">The TrapX DeceptionGrid platform protects your valuable assets against a multitude of attacks including malicious insiders and sophisticated cybercriminals.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">The Deception Product of Choice</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">DeceptionGrid’s depth and breadth of deception capability is unmatched. Our powerful architecture presents the deception attack surfaces that best match attacker activity. Learn more below.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Console with Attack Visualization</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">New expanded visualization enables the security operations team to rapidly understand the activities of the attacker over time, from the originating intrusion to the assets they are engaging with, to the final containment.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Attacker ID</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">New attack identification automatically determines if an attack is being conducted by a human attacker, or automated attack tools, giving security teams a better understanding of the attack and subsequent containment methods.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Automated Provisioning</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\"> Automated Provision of Deception Components. DeceptionGrid scans your existing network and provisions hundreds-to-thousands of deception components including Tokens (lures) and Traps (decoys).</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Deception Tokens</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Deception Tokens (lures) appear as ordinary files, scripts and databases, are embedded within real IT assets to bait and divert attackers.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Active Traps</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">New active traps functionality creates a stream of false network traffic between deployed traps to confuse and divert attackers that monitor the network traffic.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Emulated Traps</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Medium Interaction Emulated Traps</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Our patented emulated traps can be deployed at the largest enterprise scale through automation. You can select from a wide variety of servers, databases, workstations, switches, routers and more.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Industry Templates</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">The patented medium interaction traps now include expanded templates for specialized devices based on industries. These templates include, ATM’s and SWIFT assets for financial services, or Point of Sale (PoS) devices for retail, as well as devices for medical, manufacturing and many more, allowing customers to determine if attackers are targeting specialized devices that are often vulnerable to attack.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">FullOS Traps</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">High Interaction (Full Operating System) Traps</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">DeceptionGrid enables the provision of full operating system (fullOS) traps. Our medium interaction traps automatically extend engaged attackers through our smart deception to our fullOS decoys for the deepest attacker diversion and engagement. FullOS traps also enable customers to clone existing assets – you can completely replicate actual production servers to further deceive attackers.</span>\r\n","shortDescription":"The TrapX DeceptionGrid protects your valuable assets against a multitude of attacks including malicious insiders, lateral-movement, Advanced Persistent Threats (APTs) and sophisticated cybercriminals","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":12,"sellingCount":8,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"DeceptionGrid protects your valuable assets against a multitude of attacks including malicious insiders, lateral-movement","keywords":"from, TrapX, DeceptionGrid, breach, attack, platform, intelligence, remediation, protects, assets, malicious insiders, lateral-movement, Advanced Persistent Threats (APTs), sophisticated cybercriminals, Console, Attack Visualization, security operations team, intrusion, Attacker ID, attack identification, human attacker, automated attack tools, security teams, Automated Provisioning, Deception Tokens, Active Traps, Emulated Traps, Medium Interaction Emulated Traps, FullOS Traps, High Interaction (Full Operating System) Traps","description":"The TrapX DeceptionGrid platform protects your valuable assets against a multitude of attacks including malicious insiders and sophisticated cybercriminals.","og:title":"DeceptionGrid protects your valuable assets against a multitude of attacks including malicious insiders, lateral-movement","og:description":"The TrapX DeceptionGrid platform protects your valuable assets against a multitude of attacks including malicious insiders and sophisticated cybercriminals."},"eventUrl":"","translationId":1723,"dealDetails":{"avgPartnerDiscount":30,"dealProtection":1,"avgDealSize":30000,"dealSizeCurrency":"","avgDealClosing":3},"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"It is required to transfer the customer data to the vendor in order to receive a testing version for 30 days","categories":[{"id":199,"title":"Deception Techniques and Honeypots","alias":"deception-techniques-and-honeypots","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/simulation-and-trap-technologies.png"},{"id":204,"title":"Managed Detection and Response","alias":"managed-detection-and-response","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/threat-detection-and-response.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":282,"title":"Unaurthorized access to corporate IT systems and data"},{"id":336,"title":"Risk or Leaks of confidential information"},{"id":344,"title":"Malware infection via Internet, email, storage devices"},{"id":384,"title":"Risk of attacks by hackers"},{"id":385,"title":"Risk of data loss or damage"}]}},"categories":[{"id":199,"title":"Deception Techniques and Honeypots","alias":"deception-techniques-and-honeypots","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/simulation-and-trap-technologies.png"},{"id":204,"title":"Managed Detection and Response","alias":"managed-detection-and-response","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/threat-detection-and-response.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://share.trapx.com/dl/s1mqPwZmMA","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},"trapx-deceptiongrid-platform-for-financial-industry":{"id":518,"title":"TrapX DeceptionGrid Platform for financial industry","description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold; \">Attackers Target Authentication Data</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold; \">Project Background - a Technology Evaluation</span>\r\nOur financial case study focuses on a global insurance institution. Prior toour involvement, there were absolutely no indicators of malware infection or persistent threats visible to the customer. The customer had a robustindustry suite of cyber defense products which included a firewall, antivirussuites, intrusion detection software, endpoint security and othersoftware.\r\nWithin a short period of time, the TrapX DeceptionGrid generatedALERTS and identified two malicious separate processes involved inunauthorized lateral movement within the insurance company network.\r\nUpon analysis it was determined that both of these malicious processeswere communicating with multiple connection points in Russia.\r\nThese connection points in Russia and the other injected softwarecaptured worked together as an advanced password stealer. The attackerspenetrated the network and had captured password information. This targeted theft of authentication credentials represented a serious threat tothe integrity of the company's overall operations. At this time it has notbeen determined to what extent passwords were captured prior todetection.\r\nOther malware of lower risk identified by DeceptionGrid included Trj/Downloader.LEK Trojan, TROJ_QHOST.DB Trojan, and theW32.Greypack worm. All of these were not detected by the customersexisting cyber suite. Analysis suggests at least one of them might havebeen detected but the alerts were missed against the volume of overallalert traffic.\r\n\r\n<span style=\"font-weight: bold;\">Critical and Confidential Authentication Credentials at Risk</span>\r\nTrapX determined that critical and confidential password data was beingexfiltrated to Russia. The scope of data compromise is still underinvestigation at this time and the global insurance firm has taken preemptivemeasures to replace credentials on suspected software systems. \r\n","alias":"trapx-deceptiongrid-platform-for-financial-industry","roi":0,"seo":{"title":"TrapX DeceptionGrid Platform for financial industry","keywords":"were, insurance, time, determined, Russia, TrapX, password, DeceptionGrid","description":"Attackers Target Authentication Data\rProject Background - a Technology Evaluation\rOur financial case study focuses on a global insurance institution. Prior","og:title":"TrapX DeceptionGrid Platform for financial industry","og:description":"Attackers Target Authentication Data\rProject Background - a Technology Evaluation\rOur financial case study focuses on a global insurance institution. Prior"},"deal_info":"","user":{"id":4195,"title":"Hidden user","logoURL":"https://old.b4r.io/uploads/roi/company/hidden_user.jpg","alias":"skrytyi-polzovatel","address":"","roles":[],"description":"User Information is confidential ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":13,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hidden user","keywords":"Hidden, user, User, Information, confidential","description":"User Information is confidential ","og:title":"Hidden user","og:description":"User Information is confidential ","og:image":"https://old.b4r.io/uploads/roi/company/hidden_user.jpg"},"eventUrl":""},"supplier":{},"vendors":[{"id":3890,"title":"TrapX","logoURL":"https://old.b4r.io/uploads/roi/company/TrapX.png","alias":"trapx","address":"","roles":[],"description":"TrapX has created a new generation of deception technology that provides real-time breach detection and prevention. Our field proven solution deceives would-be attackers with turn-key decoys (traps) that “imitate” your true assets. Hundreds or thousands of traps can be deployed with little effort, creating a virtual mine field for cyberattacks, alerting you to any malicious activity with actionable intelligence immediately.","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":1,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":9,"vendorPartnersCount":0,"supplierPartnersCount":1,"b4r":0,"categories":{},"companyUrl":"https://trapx.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"TrapX","keywords":"with, TrapX, field, that, traps, little, creating, deployed","description":"TrapX has created a new generation of deception technology that provides real-time breach detection and prevention. Our field proven solution deceives would-be","og:title":"TrapX","og:description":"TrapX has created a new generation of deception technology that provides real-time breach detection and prevention. Our field proven solution deceives would-be","og:image":"https://old.b4r.io/uploads/roi/company/TrapX.png"},"eventUrl":""}],"products":[{"id":1724,"logo":false,"scheme":false,"title":"TrapX DeceptionGrid platform","vendorVerified":0,"rating":"3.30","implementationsCount":9,"suppliersCount":0,"alias":"trapx-deceptiongrid-platform1","companyTypes":[],"description":"<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">The TrapX DeceptionGrid platform protects your valuable assets against a multitude of attacks including malicious insiders and sophisticated cybercriminals.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">The Deception Product of Choice</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">DeceptionGrid’s depth and breadth of deception capability is unmatched. Our powerful architecture presents the deception attack surfaces that best match attacker activity. Learn more below.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Console with Attack Visualization</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">New expanded visualization enables the security operations team to rapidly understand the activities of the attacker over time, from the originating intrusion to the assets they are engaging with, to the final containment.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Attacker ID</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">New attack identification automatically determines if an attack is being conducted by a human attacker, or automated attack tools, giving security teams a better understanding of the attack and subsequent containment methods.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Automated Provisioning</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\"> Automated Provision of Deception Components. DeceptionGrid scans your existing network and provisions hundreds-to-thousands of deception components including Tokens (lures) and Traps (decoys).</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Deception Tokens</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Deception Tokens (lures) appear as ordinary files, scripts and databases, are embedded within real IT assets to bait and divert attackers.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Active Traps</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">New active traps functionality creates a stream of false network traffic between deployed traps to confuse and divert attackers that monitor the network traffic.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Emulated Traps</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Medium Interaction Emulated Traps</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Our patented emulated traps can be deployed at the largest enterprise scale through automation. You can select from a wide variety of servers, databases, workstations, switches, routers and more.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Industry Templates</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">The patented medium interaction traps now include expanded templates for specialized devices based on industries. These templates include, ATM’s and SWIFT assets for financial services, or Point of Sale (PoS) devices for retail, as well as devices for medical, manufacturing and many more, allowing customers to determine if attackers are targeting specialized devices that are often vulnerable to attack.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">FullOS Traps</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">High Interaction (Full Operating System) Traps</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">DeceptionGrid enables the provision of full operating system (fullOS) traps. Our medium interaction traps automatically extend engaged attackers through our smart deception to our fullOS decoys for the deepest attacker diversion and engagement. FullOS traps also enable customers to clone existing assets – you can completely replicate actual production servers to further deceive attackers.</span>\r\n","shortDescription":"The TrapX DeceptionGrid protects your valuable assets against a multitude of attacks including malicious insiders, lateral-movement, Advanced Persistent Threats (APTs) and sophisticated cybercriminals","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":12,"sellingCount":8,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"DeceptionGrid protects your valuable assets against a multitude of attacks including malicious insiders, lateral-movement","keywords":"from, TrapX, DeceptionGrid, breach, attack, platform, intelligence, remediation, protects, assets, malicious insiders, lateral-movement, Advanced Persistent Threats (APTs), sophisticated cybercriminals, Console, Attack Visualization, security operations team, intrusion, Attacker ID, attack identification, human attacker, automated attack tools, security teams, Automated Provisioning, Deception Tokens, Active Traps, Emulated Traps, Medium Interaction Emulated Traps, FullOS Traps, High Interaction (Full Operating System) Traps","description":"The TrapX DeceptionGrid platform protects your valuable assets against a multitude of attacks including malicious insiders and sophisticated cybercriminals.","og:title":"DeceptionGrid protects your valuable assets against a multitude of attacks including malicious insiders, lateral-movement","og:description":"The TrapX DeceptionGrid platform protects your valuable assets against a multitude of attacks including malicious insiders and sophisticated cybercriminals."},"eventUrl":"","translationId":1723,"dealDetails":{"avgPartnerDiscount":30,"dealProtection":1,"avgDealSize":30000,"dealSizeCurrency":"","avgDealClosing":3},"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"It is required to transfer the customer data to the vendor in order to receive a testing version for 30 days","categories":[{"id":199,"title":"Deception Techniques and Honeypots","alias":"deception-techniques-and-honeypots","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/simulation-and-trap-technologies.png"},{"id":204,"title":"Managed Detection and Response","alias":"managed-detection-and-response","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/threat-detection-and-response.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":384,"title":"Risk of attacks by hackers"},{"id":385,"title":"Risk of data loss or damage"},{"id":386,"title":"Risk of lost access to data and IT systems"}]}},"categories":[{"id":199,"title":"Deception Techniques and Honeypots","alias":"deception-techniques-and-honeypots","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/simulation-and-trap-technologies.png"},{"id":204,"title":"Managed Detection and Response","alias":"managed-detection-and-response","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/threat-detection-and-response.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://trapx.com/wp-content/uploads/2017/08/Case_Study_TrapX_Finance_Insurance.pdf","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},"trapx-deceptiongrid-platform-for-law-enforcement":{"id":521,"title":"TrapX DeceptionGrid Platform for Law Enforcement","description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Attackers Target Law Enforcement Data</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Project Background - a Technology Evaluation</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Our case study focuses on a prominent law enforcement agency. This agency has responsibility for many activities which may include highly sensitive investigations into organized crime and terrorist activity. This agency is always interested in improving their cyber defenses and has a large budget dedicated to technology acquisition. Priorities for this agency include the protection of the confidentiality of their ongoing operations, internal processes and their personnel.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">This agency conducted a survey of technology vendors and wanted to learn more about deception technology. They were familiar with legacy honeypot technology and found it to be far to expensive to implement both in terms of resources and financial cost. This agency was very cautious and had partitioned several networks within the enterprise. Some were to be used for highly confidential (classified) data only - others for data of lesser confidentiality.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Advanced Persistent Threat Leverages Lapse in Protocol</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">DeceptionGrid was placed into operation. Within one week the customer security operations (SOC) team received a High Priority Alert indicating the lateral movement of an advanced threat. The malware was automatically trapped and injected into the sandbox for continued analysis. The attackers had established sophisticated command and control and had bypassed the complete array of existing intrusion detection, firewall, endpoint and perimeter cyber software defense.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">A full investigation continued as DeceptionGrid continued to monitor and capture malware movement. The agency's security operations team determined that there was an internal breach in their protocol. A connection, in breach of the agency's operting procedures, was found between their secure network and one of the less secure networks (lower security rating). This breach in protocol enabled the attacker's access .</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Exfiltration of Data Discovered and Halted</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">The attacker was found to have moved without detection throughout the law enforcement agency network and servers. There were over ten explicit lateral movements made prior to detection by DeceptionGrid. The attacker found and exfiltrated data including the confidential records of agency personnel, their I.D information, their photographs and other highly confidential data. DeceptionGrid enabled the agency to disrupt the attack and then confidently restore normal security protocols.</span>","alias":"trapx-deceptiongrid-platform-for-law-enforcement","roi":0,"seo":{"title":"TrapX DeceptionGrid Platform for Law Enforcement","keywords":"agency, their, This, DeceptionGrid, security, data, found, technology","description":"Attackers Target Law Enforcement Data\rProject Background - a Technology Evaluation\rOur case study focuses on a prominent law enforcement agency. This agency","og:title":"TrapX DeceptionGrid Platform for Law Enforcement","og:description":"Attackers Target Law Enforcement Data\rProject Background - a Technology Evaluation\rOur case study focuses on a prominent law enforcement agency. This agency"},"deal_info":"","user":{"id":4195,"title":"Hidden user","logoURL":"https://old.b4r.io/uploads/roi/company/hidden_user.jpg","alias":"skrytyi-polzovatel","address":"","roles":[],"description":"User Information is confidential ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":13,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hidden user","keywords":"Hidden, user, User, Information, confidential","description":"User Information is confidential ","og:title":"Hidden user","og:description":"User Information is confidential ","og:image":"https://old.b4r.io/uploads/roi/company/hidden_user.jpg"},"eventUrl":""},"supplier":{},"vendors":[{"id":3890,"title":"TrapX","logoURL":"https://old.b4r.io/uploads/roi/company/TrapX.png","alias":"trapx","address":"","roles":[],"description":"TrapX has created a new generation of deception technology that provides real-time breach detection and prevention. Our field proven solution deceives would-be attackers with turn-key decoys (traps) that “imitate” your true assets. Hundreds or thousands of traps can be deployed with little effort, creating a virtual mine field for cyberattacks, alerting you to any malicious activity with actionable intelligence immediately.","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":1,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":9,"vendorPartnersCount":0,"supplierPartnersCount":1,"b4r":0,"categories":{},"companyUrl":"https://trapx.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"TrapX","keywords":"with, TrapX, field, that, traps, little, creating, deployed","description":"TrapX has created a new generation of deception technology that provides real-time breach detection and prevention. Our field proven solution deceives would-be","og:title":"TrapX","og:description":"TrapX has created a new generation of deception technology that provides real-time breach detection and prevention. Our field proven solution deceives would-be","og:image":"https://old.b4r.io/uploads/roi/company/TrapX.png"},"eventUrl":""}],"products":[{"id":1724,"logo":false,"scheme":false,"title":"TrapX DeceptionGrid platform","vendorVerified":0,"rating":"3.30","implementationsCount":9,"suppliersCount":0,"alias":"trapx-deceptiongrid-platform1","companyTypes":[],"description":"<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">The TrapX DeceptionGrid platform protects your valuable assets against a multitude of attacks including malicious insiders and sophisticated cybercriminals.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">The Deception Product of Choice</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">DeceptionGrid’s depth and breadth of deception capability is unmatched. Our powerful architecture presents the deception attack surfaces that best match attacker activity. Learn more below.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Console with Attack Visualization</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">New expanded visualization enables the security operations team to rapidly understand the activities of the attacker over time, from the originating intrusion to the assets they are engaging with, to the final containment.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Attacker ID</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">New attack identification automatically determines if an attack is being conducted by a human attacker, or automated attack tools, giving security teams a better understanding of the attack and subsequent containment methods.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Automated Provisioning</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\"> Automated Provision of Deception Components. DeceptionGrid scans your existing network and provisions hundreds-to-thousands of deception components including Tokens (lures) and Traps (decoys).</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Deception Tokens</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Deception Tokens (lures) appear as ordinary files, scripts and databases, are embedded within real IT assets to bait and divert attackers.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Active Traps</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">New active traps functionality creates a stream of false network traffic between deployed traps to confuse and divert attackers that monitor the network traffic.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Emulated Traps</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Medium Interaction Emulated Traps</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Our patented emulated traps can be deployed at the largest enterprise scale through automation. You can select from a wide variety of servers, databases, workstations, switches, routers and more.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Industry Templates</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">The patented medium interaction traps now include expanded templates for specialized devices based on industries. These templates include, ATM’s and SWIFT assets for financial services, or Point of Sale (PoS) devices for retail, as well as devices for medical, manufacturing and many more, allowing customers to determine if attackers are targeting specialized devices that are often vulnerable to attack.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">FullOS Traps</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">High Interaction (Full Operating System) Traps</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">DeceptionGrid enables the provision of full operating system (fullOS) traps. Our medium interaction traps automatically extend engaged attackers through our smart deception to our fullOS decoys for the deepest attacker diversion and engagement. FullOS traps also enable customers to clone existing assets – you can completely replicate actual production servers to further deceive attackers.</span>\r\n","shortDescription":"The TrapX DeceptionGrid protects your valuable assets against a multitude of attacks including malicious insiders, lateral-movement, Advanced Persistent Threats (APTs) and sophisticated cybercriminals","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":12,"sellingCount":8,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"DeceptionGrid protects your valuable assets against a multitude of attacks including malicious insiders, lateral-movement","keywords":"from, TrapX, DeceptionGrid, breach, attack, platform, intelligence, remediation, protects, assets, malicious insiders, lateral-movement, Advanced Persistent Threats (APTs), sophisticated cybercriminals, Console, Attack Visualization, security operations team, intrusion, Attacker ID, attack identification, human attacker, automated attack tools, security teams, Automated Provisioning, Deception Tokens, Active Traps, Emulated Traps, Medium Interaction Emulated Traps, FullOS Traps, High Interaction (Full Operating System) Traps","description":"The TrapX DeceptionGrid platform protects your valuable assets against a multitude of attacks including malicious insiders and sophisticated cybercriminals.","og:title":"DeceptionGrid protects your valuable assets against a multitude of attacks including malicious insiders, lateral-movement","og:description":"The TrapX DeceptionGrid platform protects your valuable assets against a multitude of attacks including malicious insiders and sophisticated cybercriminals."},"eventUrl":"","translationId":1723,"dealDetails":{"avgPartnerDiscount":30,"dealProtection":1,"avgDealSize":30000,"dealSizeCurrency":"","avgDealClosing":3},"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"It is required to transfer the customer data to the vendor in order to receive a testing version for 30 days","categories":[{"id":199,"title":"Deception Techniques and Honeypots","alias":"deception-techniques-and-honeypots","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/simulation-and-trap-technologies.png"},{"id":204,"title":"Managed Detection and Response","alias":"managed-detection-and-response","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/threat-detection-and-response.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":384,"title":"Risk of attacks by hackers"},{"id":385,"title":"Risk of data loss or damage"},{"id":386,"title":"Risk of lost access to data and IT systems"}]}},"categories":[{"id":199,"title":"Deception Techniques and Honeypots","alias":"deception-techniques-and-honeypots","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/simulation-and-trap-technologies.png"},{"id":204,"title":"Managed Detection and Response","alias":"managed-detection-and-response","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/threat-detection-and-response.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://trapx.com/wp-content/uploads/2017/08/Case_Study_TrapX_StateLawEnforcement.pdf","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},"trapx-deceptiongrid-platform-for-national-government":{"id":519,"title":"TrapX DeceptionGrid Platform for National Government","description":"<span style=\"font-size: 12px; font-family: Verdana, sans-serif; color: rgb(0, 0, 0); font-weight: bold; \">Multiple Attackers Penetrate National Agency</span>\r\n<span style=\"font-size: 12px; font-family: Verdana, sans-serif; color: rgb(0, 0, 0); font-weight: bold; \">Project Background - a Technology Evaluation</span>\r\n<span style=\"font-size: 12px; font-family: Verdana, sans-serif; color: rgb(0, 0, 0); \">Our case study focuses on a large national government agency. This agency has hundreds of employees and has multiple facilities disbursed over a large geographic area. This agency wanted to learn more about deception technology as part of their regular evaluation of cyber security vendors.</span>\r\n<span style=\"font-size: 12px; font-family: Verdana, sans-serif; color: rgb(0, 0, 0); font-weight: bold; \">Massive Penetration by Attackers Detected in Multiple Areas</span>\r\n<span style=\"font-size: 12px; font-family: Verdana, sans-serif; color: rgb(0, 0, 0); \">DeceptionGrid was placed into operation. Starting almost immediately and over the course of several weeks the government security operations command (SOC) team received multiple High Priority Alerts. This was one of the most massive attacks we have ever discovered. We identified multiple attackers in several areas to include over five (5+) attackers using malware servers, over five (5+) attackers linking back data flow to botnet c&c servers and over fifty (50+) remote attackers using TOR anonymous proxy to hide source IP addresses. In some cases the malware was automatically trapped and injected into the sandbox for continued analysis. Multiple attackers had established command and control and had bypassed the complete array of existing intrusion detection, firewall, endpoint and perimeter cyber software defense.</span>\r\n<span style=\"font-size: 12px; font-family: Verdana, sans-serif; color: rgb(0, 0, 0); \">Malware found included Cryptowall, P2P Malware, Trojan-Banker, TrojanRansome, Mobogenie.B and WS.Reputation.1. </span>\r\n<span style=\"font-size: 12px; font-family: Verdana, sans-serif; color: rgb(0, 0, 0); font-weight: bold; \">Exfiltration of Data Discovered - Broadscale Remediation Required</span>\r\n<span style=\"font-size: 12px; font-family: Verdana, sans-serif; color: rgb(0, 0, 0); \">It is clear that multiple attackers have successfully exfiltrated data from this government agency. The attack vectors varied substantially and compromised workstations and servers across multiple departments. Required remediation was done on a broad scale and included reprovisioning of both workstations and servers. The government involved has been forced to either re-provision on a large scale, or, to perform more time intensive memory dump analysis to better understand the extent of the penetration by this varied mix of attackers. Source attacker IP adresses as known are confidential at this time and part of an ongoing criminal investigation.</span>","alias":"trapx-deceptiongrid-platform-for-national-government","roi":0,"seo":{"title":"TrapX DeceptionGrid Platform for National Government","keywords":"attackers, multiple, over, government, servers, agency, This, large","description":"Multiple Attackers Penetrate National Agency\rProject Background - a Technology Evaluation\rOur case study focuses on a large national government agency. This","og:title":"TrapX DeceptionGrid Platform for National Government","og:description":"Multiple Attackers Penetrate National Agency\rProject Background - a Technology Evaluation\rOur case study focuses on a large national government agency. This"},"deal_info":"","user":{"id":4195,"title":"Hidden user","logoURL":"https://old.b4r.io/uploads/roi/company/hidden_user.jpg","alias":"skrytyi-polzovatel","address":"","roles":[],"description":"User Information is confidential ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":13,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hidden user","keywords":"Hidden, user, User, Information, confidential","description":"User Information is confidential ","og:title":"Hidden user","og:description":"User Information is confidential ","og:image":"https://old.b4r.io/uploads/roi/company/hidden_user.jpg"},"eventUrl":""},"supplier":{},"vendors":[{"id":3890,"title":"TrapX","logoURL":"https://old.b4r.io/uploads/roi/company/TrapX.png","alias":"trapx","address":"","roles":[],"description":"TrapX has created a new generation of deception technology that provides real-time breach detection and prevention. Our field proven solution deceives would-be attackers with turn-key decoys (traps) that “imitate” your true assets. Hundreds or thousands of traps can be deployed with little effort, creating a virtual mine field for cyberattacks, alerting you to any malicious activity with actionable intelligence immediately.","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":1,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":9,"vendorPartnersCount":0,"supplierPartnersCount":1,"b4r":0,"categories":{},"companyUrl":"https://trapx.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"TrapX","keywords":"with, TrapX, field, that, traps, little, creating, deployed","description":"TrapX has created a new generation of deception technology that provides real-time breach detection and prevention. Our field proven solution deceives would-be","og:title":"TrapX","og:description":"TrapX has created a new generation of deception technology that provides real-time breach detection and prevention. Our field proven solution deceives would-be","og:image":"https://old.b4r.io/uploads/roi/company/TrapX.png"},"eventUrl":""}],"products":[{"id":1724,"logo":false,"scheme":false,"title":"TrapX DeceptionGrid platform","vendorVerified":0,"rating":"3.30","implementationsCount":9,"suppliersCount":0,"alias":"trapx-deceptiongrid-platform1","companyTypes":[],"description":"<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">The TrapX DeceptionGrid platform protects your valuable assets against a multitude of attacks including malicious insiders and sophisticated cybercriminals.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">The Deception Product of Choice</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">DeceptionGrid’s depth and breadth of deception capability is unmatched. Our powerful architecture presents the deception attack surfaces that best match attacker activity. Learn more below.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Console with Attack Visualization</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">New expanded visualization enables the security operations team to rapidly understand the activities of the attacker over time, from the originating intrusion to the assets they are engaging with, to the final containment.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Attacker ID</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">New attack identification automatically determines if an attack is being conducted by a human attacker, or automated attack tools, giving security teams a better understanding of the attack and subsequent containment methods.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Automated Provisioning</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\"> Automated Provision of Deception Components. DeceptionGrid scans your existing network and provisions hundreds-to-thousands of deception components including Tokens (lures) and Traps (decoys).</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Deception Tokens</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Deception Tokens (lures) appear as ordinary files, scripts and databases, are embedded within real IT assets to bait and divert attackers.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Active Traps</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">New active traps functionality creates a stream of false network traffic between deployed traps to confuse and divert attackers that monitor the network traffic.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Emulated Traps</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Medium Interaction Emulated Traps</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Our patented emulated traps can be deployed at the largest enterprise scale through automation. You can select from a wide variety of servers, databases, workstations, switches, routers and more.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Industry Templates</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">The patented medium interaction traps now include expanded templates for specialized devices based on industries. These templates include, ATM’s and SWIFT assets for financial services, or Point of Sale (PoS) devices for retail, as well as devices for medical, manufacturing and many more, allowing customers to determine if attackers are targeting specialized devices that are often vulnerable to attack.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">FullOS Traps</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">High Interaction (Full Operating System) Traps</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">DeceptionGrid enables the provision of full operating system (fullOS) traps. Our medium interaction traps automatically extend engaged attackers through our smart deception to our fullOS decoys for the deepest attacker diversion and engagement. FullOS traps also enable customers to clone existing assets – you can completely replicate actual production servers to further deceive attackers.</span>\r\n","shortDescription":"The TrapX DeceptionGrid protects your valuable assets against a multitude of attacks including malicious insiders, lateral-movement, Advanced Persistent Threats (APTs) and sophisticated cybercriminals","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":12,"sellingCount":8,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"DeceptionGrid protects your valuable assets against a multitude of attacks including malicious insiders, lateral-movement","keywords":"from, TrapX, DeceptionGrid, breach, attack, platform, intelligence, remediation, protects, assets, malicious insiders, lateral-movement, Advanced Persistent Threats (APTs), sophisticated cybercriminals, Console, Attack Visualization, security operations team, intrusion, Attacker ID, attack identification, human attacker, automated attack tools, security teams, Automated Provisioning, Deception Tokens, Active Traps, Emulated Traps, Medium Interaction Emulated Traps, FullOS Traps, High Interaction (Full Operating System) Traps","description":"The TrapX DeceptionGrid platform protects your valuable assets against a multitude of attacks including malicious insiders and sophisticated cybercriminals.","og:title":"DeceptionGrid protects your valuable assets against a multitude of attacks including malicious insiders, lateral-movement","og:description":"The TrapX DeceptionGrid platform protects your valuable assets against a multitude of attacks including malicious insiders and sophisticated cybercriminals."},"eventUrl":"","translationId":1723,"dealDetails":{"avgPartnerDiscount":30,"dealProtection":1,"avgDealSize":30000,"dealSizeCurrency":"","avgDealClosing":3},"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"It is required to transfer the customer data to the vendor in order to receive a testing version for 30 days","categories":[{"id":199,"title":"Deception Techniques and Honeypots","alias":"deception-techniques-and-honeypots","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/simulation-and-trap-technologies.png"},{"id":204,"title":"Managed Detection and Response","alias":"managed-detection-and-response","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/threat-detection-and-response.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":384,"title":"Risk of attacks by hackers"},{"id":385,"title":"Risk of data loss or damage"},{"id":386,"title":"Risk of lost access to data and IT systems"}]}},"categories":[{"id":199,"title":"Deception Techniques and Honeypots","alias":"deception-techniques-and-honeypots","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/simulation-and-trap-technologies.png"},{"id":204,"title":"Managed Detection and Response","alias":"managed-detection-and-response","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/threat-detection-and-response.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://trapx.com/wp-content/uploads/2017/08/Case_Study_TrapX_NationalGovernment.pdf","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},"trapx-deceptiongrid-platform-for-software-vendor":{"id":520,"title":"TrapX DeceptionGrid Platform for Software Vendor","description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Attackers Target Software Company</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Project Background - a Technology Evaluation</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Our case study focuses on a leading software vendor that provides software through cloud services to their customers in healthcare. This customer's information technology team invested very substantially in defense-in-depth cyber defense software. Their security operations center regularly detected malware and was able to routinely remediate all of these known incidents.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">The customer had a strong industry suite of cyber defense products which included firewalls, anti virus suites, intrusion detection software, endpoint security and other software. Our initial installation included over ten (10) vLANS.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">DeceptionGrid was placed into operation. Almost immediately the customer information technology staff received multiple High Priority Alerts. These included identified suspicious activity and led to the discovery of several network misconfigurations. Several internal internet addresses were exposed to the internet and open to a variety of high risk protocols. Inbound connections from attackers were operational via SSH, Telnet and Remote Desktop. A TOR (anonymous proxy) obfuscated web crawler had mapped all of the exposed hosts.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Some of the malware was automatically trapped and injected into the sandbox by DeceptionGrid for continued analysis. The attackers had multiple command and control points and had bypassed the complete array of existing security.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Multiple Concurrent Attackers Detected and Remediated</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">A full investigation continued as DeceptionGrid continued to monitor and capture malware movement. Multiple command and control point in six (6) workstations were linked to attackers in Beijing China, Moldava, and the multiple locations within Ukraine. Dozens of workstations had to be reprovisioned to eliminate access. Manual memory dump and analysis was required across many information technology assets to identify the full scope of the extensive and previously undetected attacker activity. Scope of Data Theft Remains Indeterminate Multiple attackers accessed this technology company's networks workstations and servers. The scope of intellectual property data exfiltration and theft is unknown but under continued investigation. </span>","alias":"trapx-deceptiongrid-platform-for-software-vendor","roi":0,"seo":{"title":"TrapX DeceptionGrid Platform for Software Vendor","keywords":"software, attackers, DeceptionGrid, continued, technology, customer, security, information","description":"Attackers Target Software Company\rProject Background - a Technology Evaluation\rOur case study focuses on a leading software vendor that provides software","og:title":"TrapX DeceptionGrid Platform for Software Vendor","og:description":"Attackers Target Software Company\rProject Background - a Technology Evaluation\rOur case study focuses on a leading software vendor that provides software"},"deal_info":"","user":{"id":4195,"title":"Hidden user","logoURL":"https://old.b4r.io/uploads/roi/company/hidden_user.jpg","alias":"skrytyi-polzovatel","address":"","roles":[],"description":"User Information is confidential ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":13,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hidden user","keywords":"Hidden, user, User, Information, confidential","description":"User Information is confidential ","og:title":"Hidden user","og:description":"User Information is confidential ","og:image":"https://old.b4r.io/uploads/roi/company/hidden_user.jpg"},"eventUrl":""},"supplier":{},"vendors":[{"id":3890,"title":"TrapX","logoURL":"https://old.b4r.io/uploads/roi/company/TrapX.png","alias":"trapx","address":"","roles":[],"description":"TrapX has created a new generation of deception technology that provides real-time breach detection and prevention. Our field proven solution deceives would-be attackers with turn-key decoys (traps) that “imitate” your true assets. Hundreds or thousands of traps can be deployed with little effort, creating a virtual mine field for cyberattacks, alerting you to any malicious activity with actionable intelligence immediately.","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":1,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":9,"vendorPartnersCount":0,"supplierPartnersCount":1,"b4r":0,"categories":{},"companyUrl":"https://trapx.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"TrapX","keywords":"with, TrapX, field, that, traps, little, creating, deployed","description":"TrapX has created a new generation of deception technology that provides real-time breach detection and prevention. Our field proven solution deceives would-be","og:title":"TrapX","og:description":"TrapX has created a new generation of deception technology that provides real-time breach detection and prevention. Our field proven solution deceives would-be","og:image":"https://old.b4r.io/uploads/roi/company/TrapX.png"},"eventUrl":""}],"products":[{"id":1724,"logo":false,"scheme":false,"title":"TrapX DeceptionGrid platform","vendorVerified":0,"rating":"3.30","implementationsCount":9,"suppliersCount":0,"alias":"trapx-deceptiongrid-platform1","companyTypes":[],"description":"<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">The TrapX DeceptionGrid platform protects your valuable assets against a multitude of attacks including malicious insiders and sophisticated cybercriminals.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">The Deception Product of Choice</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">DeceptionGrid’s depth and breadth of deception capability is unmatched. Our powerful architecture presents the deception attack surfaces that best match attacker activity. Learn more below.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Console with Attack Visualization</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">New expanded visualization enables the security operations team to rapidly understand the activities of the attacker over time, from the originating intrusion to the assets they are engaging with, to the final containment.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Attacker ID</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">New attack identification automatically determines if an attack is being conducted by a human attacker, or automated attack tools, giving security teams a better understanding of the attack and subsequent containment methods.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Automated Provisioning</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\"> Automated Provision of Deception Components. DeceptionGrid scans your existing network and provisions hundreds-to-thousands of deception components including Tokens (lures) and Traps (decoys).</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Deception Tokens</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Deception Tokens (lures) appear as ordinary files, scripts and databases, are embedded within real IT assets to bait and divert attackers.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Active Traps</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">New active traps functionality creates a stream of false network traffic between deployed traps to confuse and divert attackers that monitor the network traffic.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Emulated Traps</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Medium Interaction Emulated Traps</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Our patented emulated traps can be deployed at the largest enterprise scale through automation. You can select from a wide variety of servers, databases, workstations, switches, routers and more.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Industry Templates</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">The patented medium interaction traps now include expanded templates for specialized devices based on industries. These templates include, ATM’s and SWIFT assets for financial services, or Point of Sale (PoS) devices for retail, as well as devices for medical, manufacturing and many more, allowing customers to determine if attackers are targeting specialized devices that are often vulnerable to attack.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">FullOS Traps</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">High Interaction (Full Operating System) Traps</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">DeceptionGrid enables the provision of full operating system (fullOS) traps. Our medium interaction traps automatically extend engaged attackers through our smart deception to our fullOS decoys for the deepest attacker diversion and engagement. FullOS traps also enable customers to clone existing assets – you can completely replicate actual production servers to further deceive attackers.</span>\r\n","shortDescription":"The TrapX DeceptionGrid protects your valuable assets against a multitude of attacks including malicious insiders, lateral-movement, Advanced Persistent Threats (APTs) and sophisticated cybercriminals","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":12,"sellingCount":8,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"DeceptionGrid protects your valuable assets against a multitude of attacks including malicious insiders, lateral-movement","keywords":"from, TrapX, DeceptionGrid, breach, attack, platform, intelligence, remediation, protects, assets, malicious insiders, lateral-movement, Advanced Persistent Threats (APTs), sophisticated cybercriminals, Console, Attack Visualization, security operations team, intrusion, Attacker ID, attack identification, human attacker, automated attack tools, security teams, Automated Provisioning, Deception Tokens, Active Traps, Emulated Traps, Medium Interaction Emulated Traps, FullOS Traps, High Interaction (Full Operating System) Traps","description":"The TrapX DeceptionGrid platform protects your valuable assets against a multitude of attacks including malicious insiders and sophisticated cybercriminals.","og:title":"DeceptionGrid protects your valuable assets against a multitude of attacks including malicious insiders, lateral-movement","og:description":"The TrapX DeceptionGrid platform protects your valuable assets against a multitude of attacks including malicious insiders and sophisticated cybercriminals."},"eventUrl":"","translationId":1723,"dealDetails":{"avgPartnerDiscount":30,"dealProtection":1,"avgDealSize":30000,"dealSizeCurrency":"","avgDealClosing":3},"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"It is required to transfer the customer data to the vendor in order to receive a testing version for 30 days","categories":[{"id":199,"title":"Deception Techniques and Honeypots","alias":"deception-techniques-and-honeypots","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/simulation-and-trap-technologies.png"},{"id":204,"title":"Managed Detection and Response","alias":"managed-detection-and-response","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/threat-detection-and-response.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":384,"title":"Risk of attacks by hackers"},{"id":385,"title":"Risk of data loss or damage"},{"id":386,"title":"Risk of lost access to data and IT systems"}]}},"categories":[{"id":199,"title":"Deception Techniques and Honeypots","alias":"deception-techniques-and-honeypots","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/simulation-and-trap-technologies.png"},{"id":204,"title":"Managed Detection and Response","alias":"managed-detection-and-response","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/threat-detection-and-response.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://trapx.com/wp-content/uploads/2017/08/Case_Study_TrapX_Software.pdf","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},"trapx-deceptiongrid-platform-dlja-pravitelstvennoi-organizacii":{"id":429,"title":"TrapX DeceptionGrid Platform для правительственной организации","description":"<p style=\"background-color: rgb(255, 255, 255); \"><span style=\"font-weight: bold; \">Кибер атаки на правительственную организацию</span></p>\r\n<p style=\"background-color: rgb(255, 255, 255); \"><span style=\"font-weight: bold; \">Предыстория проекта - оценка технологии</span></p>\r\n<p style=\"background-color: rgb(255, 255, 255); \">Крупное национальное правительственное агентство имеет сотни сотрудников и множество объектов, распределнных по большой географической площади. Это агентство хотело узнать больше о технологии ловушек как части своей регулярной оценки вендоров кибербезопасности.</p>\r\n<p style=\"background-color: rgb(255, 255, 255); \"><span style=\"font-weight: bold; \">Атаки обнаружены в нескольких районах </span></p>\r\n<p style=\"background-color: rgb(255, 255, 255); \">Практически сразу после введения DeceptionGrid в действие и в течение нескольких недель команда государственной безопасности получила несколько предупреждений об атаках высокой важности. Это была одна из самых массивных атак, которые мы когда-либо открывали. Мы идентифицировали нескольких злоумышленников в нескольких областях, чтобы включить более пяти (5+) злоумышленников с использованием вредоносных серверов, более пяти (5+) злоумышленников, связывающих обратный поток данных с серверами botnet c и c и более пятидесяти (50+) удаленных злоумышленников с использованием анонимного прокси TOR, чтобы скрыть исходные IP-адреса. В некоторых случаях вредоносное ПО автоматически захватывалось и вводилось в песочницу для дальнейшего анализа. Несколько злоумышленников установили команду и контроль и обошли весь массив существующих средств защиты от вторжений, защиты брандмауэра, конечной точки и периметра.</p>\r\n<p style=\"background-color: rgb(255, 255, 255); \">Вредоносные программы, кторые были обнаружены: Cryptowall, P2P Malware, Trojan-Banker, TrojanRansome, Mobogenie.B и WS.Reputation.1.</p>\r\n<p style=\"background-color: rgb(255, 255, 255); \"><span style=\"font-weight: bold; \">Эксфильтрация обнаруженных данных - Требуется широкомасштабное восстановление</span></p>\r\n<p style=\"background-color: rgb(255, 255, 255); \">Векторы атаки существенно различались и скомпрометировали рабочие станции и серверы в разных отделах. Необходимая коррекция была выполнена в широких масштабах и включала в себя репродуцирование как рабочих станций, так и серверов. Привлеченное правительство было вынуждено либо повторно предусмотреть в больших масштабах, либо выполнить более продолжительный анализ дампа памяти, чтобы лучше понять степень проникновения этого разнообразного сочетания нападавших. Исходные IP-адреса злоумышленников, как известно, являются конфиденциальными в настоящее время и частью продолжающегося уголовного расследования.</p>","alias":"trapx-deceptiongrid-platform-dlja-pravitelstvennoi-organizacii","roi":0,"seo":{"title":"TrapX DeceptionGrid Platform для правительственной организации","keywords":"attackers, over, multiple, government, servers, agency, This, this","description":"Кибер атаки на правительственную организацию\rПредыстория проекта - оценка технологии\rКрупное национальное правительственное агентство имеет сотни сотрудников и","og:title":"TrapX DeceptionGrid Platform для правительственной организации","og:description":"Кибер атаки на правительственную организацию\rПредыстория проекта - оценка технологии\rКрупное национальное правительственное агентство имеет сотни сотрудников и"},"deal_info":"","user":{"id":4195,"title":"Hidden user","logoURL":"https://old.b4r.io/uploads/roi/company/hidden_user.jpg","alias":"skrytyi-polzovatel","address":"","roles":[],"description":"User Information is confidential ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":13,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hidden user","keywords":"Hidden, user, User, Information, confidential","description":"User Information is confidential ","og:title":"Hidden user","og:description":"User Information is confidential ","og:image":"https://old.b4r.io/uploads/roi/company/hidden_user.jpg"},"eventUrl":""},"supplier":{},"vendors":[{"id":3890,"title":"TrapX","logoURL":"https://old.b4r.io/uploads/roi/company/TrapX.png","alias":"trapx","address":"","roles":[],"description":"TrapX has created a new generation of deception technology that provides real-time breach detection and prevention. Our field proven solution deceives would-be attackers with turn-key decoys (traps) that “imitate” your true assets. Hundreds or thousands of traps can be deployed with little effort, creating a virtual mine field for cyberattacks, alerting you to any malicious activity with actionable intelligence immediately.","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":1,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":9,"vendorPartnersCount":0,"supplierPartnersCount":1,"b4r":0,"categories":{},"companyUrl":"https://trapx.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"TrapX","keywords":"with, TrapX, field, that, traps, little, creating, deployed","description":"TrapX has created a new generation of deception technology that provides real-time breach detection and prevention. Our field proven solution deceives would-be","og:title":"TrapX","og:description":"TrapX has created a new generation of deception technology that provides real-time breach detection and prevention. Our field proven solution deceives would-be","og:image":"https://old.b4r.io/uploads/roi/company/TrapX.png"},"eventUrl":""}],"products":[{"id":1724,"logo":false,"scheme":false,"title":"TrapX DeceptionGrid platform","vendorVerified":0,"rating":"3.30","implementationsCount":9,"suppliersCount":0,"alias":"trapx-deceptiongrid-platform1","companyTypes":[],"description":"<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">The TrapX DeceptionGrid platform protects your valuable assets against a multitude of attacks including malicious insiders and sophisticated cybercriminals.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">The Deception Product of Choice</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">DeceptionGrid’s depth and breadth of deception capability is unmatched. Our powerful architecture presents the deception attack surfaces that best match attacker activity. Learn more below.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Console with Attack Visualization</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">New expanded visualization enables the security operations team to rapidly understand the activities of the attacker over time, from the originating intrusion to the assets they are engaging with, to the final containment.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Attacker ID</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">New attack identification automatically determines if an attack is being conducted by a human attacker, or automated attack tools, giving security teams a better understanding of the attack and subsequent containment methods.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Automated Provisioning</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\"> Automated Provision of Deception Components. DeceptionGrid scans your existing network and provisions hundreds-to-thousands of deception components including Tokens (lures) and Traps (decoys).</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Deception Tokens</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Deception Tokens (lures) appear as ordinary files, scripts and databases, are embedded within real IT assets to bait and divert attackers.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Active Traps</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">New active traps functionality creates a stream of false network traffic between deployed traps to confuse and divert attackers that monitor the network traffic.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Emulated Traps</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Medium Interaction Emulated Traps</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Our patented emulated traps can be deployed at the largest enterprise scale through automation. You can select from a wide variety of servers, databases, workstations, switches, routers and more.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Industry Templates</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">The patented medium interaction traps now include expanded templates for specialized devices based on industries. These templates include, ATM’s and SWIFT assets for financial services, or Point of Sale (PoS) devices for retail, as well as devices for medical, manufacturing and many more, allowing customers to determine if attackers are targeting specialized devices that are often vulnerable to attack.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">FullOS Traps</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">High Interaction (Full Operating System) Traps</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">DeceptionGrid enables the provision of full operating system (fullOS) traps. Our medium interaction traps automatically extend engaged attackers through our smart deception to our fullOS decoys for the deepest attacker diversion and engagement. FullOS traps also enable customers to clone existing assets – you can completely replicate actual production servers to further deceive attackers.</span>\r\n","shortDescription":"The TrapX DeceptionGrid protects your valuable assets against a multitude of attacks including malicious insiders, lateral-movement, Advanced Persistent Threats (APTs) and sophisticated cybercriminals","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":12,"sellingCount":8,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"DeceptionGrid protects your valuable assets against a multitude of attacks including malicious insiders, lateral-movement","keywords":"from, TrapX, DeceptionGrid, breach, attack, platform, intelligence, remediation, protects, assets, malicious insiders, lateral-movement, Advanced Persistent Threats (APTs), sophisticated cybercriminals, Console, Attack Visualization, security operations team, intrusion, Attacker ID, attack identification, human attacker, automated attack tools, security teams, Automated Provisioning, Deception Tokens, Active Traps, Emulated Traps, Medium Interaction Emulated Traps, FullOS Traps, High Interaction (Full Operating System) Traps","description":"The TrapX DeceptionGrid platform protects your valuable assets against a multitude of attacks including malicious insiders and sophisticated cybercriminals.","og:title":"DeceptionGrid protects your valuable assets against a multitude of attacks including malicious insiders, lateral-movement","og:description":"The TrapX DeceptionGrid platform protects your valuable assets against a multitude of attacks including malicious insiders and sophisticated cybercriminals."},"eventUrl":"","translationId":1723,"dealDetails":{"avgPartnerDiscount":30,"dealProtection":1,"avgDealSize":30000,"dealSizeCurrency":"","avgDealClosing":3},"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"It is required to transfer the customer data to the vendor in order to receive a testing version for 30 days","categories":[{"id":199,"title":"Deception Techniques and Honeypots","alias":"deception-techniques-and-honeypots","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/simulation-and-trap-technologies.png"},{"id":204,"title":"Managed Detection and Response","alias":"managed-detection-and-response","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/threat-detection-and-response.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":384,"title":"Risk of attacks by hackers"},{"id":385,"title":"Risk of data loss or damage"},{"id":386,"title":"Risk of lost access to data and IT systems"}]}},"categories":[{"id":199,"title":"Deception Techniques and Honeypots","alias":"deception-techniques-and-honeypots","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/simulation-and-trap-technologies.png"},{"id":204,"title":"Managed Detection and Response","alias":"managed-detection-and-response","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/threat-detection-and-response.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://trapx.com/wp-content/uploads/2017/08/Case_Study_TrapX_NationalGovernment.pdf","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},"trapx-deceptiongrid-platform-dlja-pravookhranitelnykh-organov":{"id":431,"title":"TrapX DeceptionGrid Platform для правоохранительных органов","description":"<span style=\"font-weight: 700; \">Целевые атаки на правоохранительные данные</span>\r\n<span style=\"font-weight: 700; \"><br /></span>\r\n<span style=\"font-weight: 700; \">Предыстория проекта - оценка технологии</span>\r\n<span style=\"font-weight: 700; \"><br /></span>\r\nПравоохранительный орган, несет ответственность за многие виды деятельности, которые могут включать расследования организованной преступности и террористической деятельности с высоким уровнем секретности. Это агентство всегда заинтересовано в улучшении своей киберзащиты и выделяет большой бюджет для приобретения технологий защиты. Приоритеты этого агентства включают защиту конфиденциальности их текущих операций, внутренних процессов и их персонала.\r\nЭто агентство провело опрос поставщиков технологий и захотело узнать больше об технологии ловушек. Они были знакомы с унаследованной технологией honeypot и нашли эту технологию слишком дорогой, как с точки зрения ресурсов, так и с учетом финансовых затрат. Это агентство было очень осторожным и разделило несколько сетей внутри предприятия. Некоторые из них должны использоваться исключительно для конфиденциальных (классифицированных) данных - для данных с меньшей конфиденциальностью.\r\nDeceptionGrid был введен в действие. В течение одной недели команда безопасности клиентов (SOC) получила сообщение с высоким приоритетом, указывающее на боковое перемещение передовой угрозы. Вредоносная программа была автоматически захвачена и введена в песочницу для дальнейшего анализа. Нападавшие установили сложную команду и контроль и обошли весь набор существующих средств защиты от вторжений, защиты брандмауэра, конечной точки и периметра.\r\nПродолжалось полное расследование, так как DeceptionGrid продолжал отслеживать и отслеживать движение вредоносных программ. Группа по операциям по обеспечению безопасности агентства установила, что в их протоколе произошло внутреннее нарушение. Связь, нарушающая процедуры обслуживания агентства, была обнаружена между их защищенной сетью и одной из менее безопасных сетей (более низкий рейтинг безопасности). Это нарушение в протоколе позволило получить доступ злоумышленника.\r\n<span style=\"font-weight: 700; \"><br /></span>\r\n<span style=\"font-weight: 700; \">Эксфиляция данных, обнаружение и остановка</span>\r\n<span style=\"font-weight: 700; \"><br /></span>\r\nБыло обнаружено, что злоумышленник двинулся без обнаружения во всей сети правоохранительных органов и на серверах. Было более десяти явных боковых движений, сделанных до обнаружения DeceptionGrid. Нападавший обнаружил и расширил данные, включая конфиденциальные записи персонала агентства, их информацию о I.D., их фотографии и другие конфиденциальные данные. DeceptionGrid позволил агентству нарушить атаку, а затем уверенно восстановить обычные протоколы безопасности.","alias":"trapx-deceptiongrid-platform-dlja-pravookhranitelnykh-organov","roi":0,"seo":{"title":"TrapX DeceptionGrid Platform для правоохранительных органов","keywords":"DeceptionGrid, безопасности, агентства, защиты, агентство, данные, данных, обнаружения","description":"Целевые атаки на правоохранительные данные\r\rПредыстория проекта - оценка технологии\r\rПравоохранительный орган, несет ответственность за многие виды","og:title":"TrapX DeceptionGrid Platform для правоохранительных органов","og:description":"Целевые атаки на правоохранительные данные\r\rПредыстория проекта - оценка технологии\r\rПравоохранительный орган, несет ответственность за многие виды"},"deal_info":"","user":{"id":4195,"title":"Hidden user","logoURL":"https://old.b4r.io/uploads/roi/company/hidden_user.jpg","alias":"skrytyi-polzovatel","address":"","roles":[],"description":"User Information is confidential ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":13,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hidden user","keywords":"Hidden, user, User, Information, confidential","description":"User Information is confidential ","og:title":"Hidden user","og:description":"User Information is confidential ","og:image":"https://old.b4r.io/uploads/roi/company/hidden_user.jpg"},"eventUrl":""},"supplier":{},"vendors":[{"id":3890,"title":"TrapX","logoURL":"https://old.b4r.io/uploads/roi/company/TrapX.png","alias":"trapx","address":"","roles":[],"description":"TrapX has created a new generation of deception technology that provides real-time breach detection and prevention. Our field proven solution deceives would-be attackers with turn-key decoys (traps) that “imitate” your true assets. Hundreds or thousands of traps can be deployed with little effort, creating a virtual mine field for cyberattacks, alerting you to any malicious activity with actionable intelligence immediately.","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":1,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":9,"vendorPartnersCount":0,"supplierPartnersCount":1,"b4r":0,"categories":{},"companyUrl":"https://trapx.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"TrapX","keywords":"with, TrapX, field, that, traps, little, creating, deployed","description":"TrapX has created a new generation of deception technology that provides real-time breach detection and prevention. Our field proven solution deceives would-be","og:title":"TrapX","og:description":"TrapX has created a new generation of deception technology that provides real-time breach detection and prevention. Our field proven solution deceives would-be","og:image":"https://old.b4r.io/uploads/roi/company/TrapX.png"},"eventUrl":""}],"products":[{"id":1724,"logo":false,"scheme":false,"title":"TrapX DeceptionGrid platform","vendorVerified":0,"rating":"3.30","implementationsCount":9,"suppliersCount":0,"alias":"trapx-deceptiongrid-platform1","companyTypes":[],"description":"<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">The TrapX DeceptionGrid platform protects your valuable assets against a multitude of attacks including malicious insiders and sophisticated cybercriminals.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">The Deception Product of Choice</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">DeceptionGrid’s depth and breadth of deception capability is unmatched. Our powerful architecture presents the deception attack surfaces that best match attacker activity. Learn more below.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Console with Attack Visualization</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">New expanded visualization enables the security operations team to rapidly understand the activities of the attacker over time, from the originating intrusion to the assets they are engaging with, to the final containment.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Attacker ID</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">New attack identification automatically determines if an attack is being conducted by a human attacker, or automated attack tools, giving security teams a better understanding of the attack and subsequent containment methods.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Automated Provisioning</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\"> Automated Provision of Deception Components. DeceptionGrid scans your existing network and provisions hundreds-to-thousands of deception components including Tokens (lures) and Traps (decoys).</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Deception Tokens</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Deception Tokens (lures) appear as ordinary files, scripts and databases, are embedded within real IT assets to bait and divert attackers.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Active Traps</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">New active traps functionality creates a stream of false network traffic between deployed traps to confuse and divert attackers that monitor the network traffic.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Emulated Traps</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Medium Interaction Emulated Traps</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Our patented emulated traps can be deployed at the largest enterprise scale through automation. You can select from a wide variety of servers, databases, workstations, switches, routers and more.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Industry Templates</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">The patented medium interaction traps now include expanded templates for specialized devices based on industries. These templates include, ATM’s and SWIFT assets for financial services, or Point of Sale (PoS) devices for retail, as well as devices for medical, manufacturing and many more, allowing customers to determine if attackers are targeting specialized devices that are often vulnerable to attack.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">FullOS Traps</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">High Interaction (Full Operating System) Traps</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">DeceptionGrid enables the provision of full operating system (fullOS) traps. Our medium interaction traps automatically extend engaged attackers through our smart deception to our fullOS decoys for the deepest attacker diversion and engagement. FullOS traps also enable customers to clone existing assets – you can completely replicate actual production servers to further deceive attackers.</span>\r\n","shortDescription":"The TrapX DeceptionGrid protects your valuable assets against a multitude of attacks including malicious insiders, lateral-movement, Advanced Persistent Threats (APTs) and sophisticated cybercriminals","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":12,"sellingCount":8,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"DeceptionGrid protects your valuable assets against a multitude of attacks including malicious insiders, lateral-movement","keywords":"from, TrapX, DeceptionGrid, breach, attack, platform, intelligence, remediation, protects, assets, malicious insiders, lateral-movement, Advanced Persistent Threats (APTs), sophisticated cybercriminals, Console, Attack Visualization, security operations team, intrusion, Attacker ID, attack identification, human attacker, automated attack tools, security teams, Automated Provisioning, Deception Tokens, Active Traps, Emulated Traps, Medium Interaction Emulated Traps, FullOS Traps, High Interaction (Full Operating System) Traps","description":"The TrapX DeceptionGrid platform protects your valuable assets against a multitude of attacks including malicious insiders and sophisticated cybercriminals.","og:title":"DeceptionGrid protects your valuable assets against a multitude of attacks including malicious insiders, lateral-movement","og:description":"The TrapX DeceptionGrid platform protects your valuable assets against a multitude of attacks including malicious insiders and sophisticated cybercriminals."},"eventUrl":"","translationId":1723,"dealDetails":{"avgPartnerDiscount":30,"dealProtection":1,"avgDealSize":30000,"dealSizeCurrency":"","avgDealClosing":3},"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"It is required to transfer the customer data to the vendor in order to receive a testing version for 30 days","categories":[{"id":199,"title":"Deception Techniques and Honeypots","alias":"deception-techniques-and-honeypots","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/simulation-and-trap-technologies.png"},{"id":204,"title":"Managed Detection and Response","alias":"managed-detection-and-response","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/threat-detection-and-response.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":384,"title":"Risk of attacks by hackers"},{"id":385,"title":"Risk of data loss or damage"},{"id":386,"title":"Risk of lost access to data and IT systems"}]}},"categories":[{"id":199,"title":"Deception Techniques and Honeypots","alias":"deception-techniques-and-honeypots","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/simulation-and-trap-technologies.png"},{"id":204,"title":"Managed Detection and Response","alias":"managed-detection-and-response","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/threat-detection-and-response.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://trapx.com/wp-content/uploads/2017/08/Case_Study_TrapX_StateLawEnforcement.pdf","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},"trapx-deceptiongrid-platform-dlja-proizvoditelja-po":{"id":430,"title":"TrapX DeceptionGrid Platform для производителя ПО","description":"<span style=\"font-weight: 700; \">Атаки нацелены на ведущего вендра программного обеспечения</span>\r\n<span style=\"font-weight: 700; \"><br /></span>\r\n<span style=\"font-weight: 700; \">Предыстория проекта - оценка технологии</span>\r\n<span style=\"font-weight: 700; \"><br /></span>\r\nВедущий поставщик программного обеспечения предоставляет программное обеспечение через облачные сервисы своим клиентам в сфере здравоохранения. Команда информационных технологий этого клиента в значительной степени инвестировала средства в защиту компьютерной безопасности. Их центр оперативной безопасности регулярно обнаруживал вредоносное ПО и смог регулярно исправлять все эти известные инциденты.\r\nУ клиента был сильный отраслевой пакет продуктов для защиты от кибернетики, который включал брандмауэры, антивирусные комплекты, программное обеспечение для обнаружения вторжений, защиту конечных точек и другое программное обеспечение. Наша первоначальная установка включала более десяти (10) vLANS.\r\nDeceptionGrid был введен в действие. Практически сразу клиентские информационные технологии получили несколько предупреждений о высокого приоритета. Они включали выявленную подозрительную деятельность и привели к обнаружению нескольких сетевых неверных конфигураций. Несколько внутренних интернет-адресов были открыты в Интернете и открыты для различных протоколов высокого риска. Входящие подключения от злоумышленников осуществлялись через SSH, Telnet и Remote Desktop. Обманный прокси-сервер TOR (анонимный прокси-сервер) отображал все выставленные хосты.\r\nНекоторые из вредоносных программ были автоматически захвачены и инъецированы в песочницу DeceptionGrid для продолжения анализа. Нападавшие имели несколько контрольных точек и обходили весь массив существующей безопасности.\r\n<span style=\"font-weight: 700; \"><br /></span>\r\n<span style=\"font-weight: 700; \">Обнаружено и устранено несколько одновременных атакующих</span>\r\n<span style=\"font-weight: 700; \"><br /></span>\r\nПродолжалось полное расследование, так как DeceptionGrid продолжал отслеживать и отслеживать движение вредоносных программ. Несколько командных и контрольных точек на шести (6) рабочих станциях были связаны с нападавшими в Пекине, Китае, Молдове, и в нескольких точках на территории Украины. Десятки рабочих станций должны были быть репродуцированы для устранения доступа. Для многих объектов информационной технологии необходимо было отображать дамп и анализ вручную, чтобы определить весь масштаб обширной и ранее не обнаруженной активности злоумышленника. Объем кражи данных остается неопределенным. Несколько злоумышленников обращались к сетевым рабочим станциям и серверам этой технологической компании. Объем исследований и хищения данных об интеллектуальной собственности неизвестен, но расследование продолжается.","alias":"trapx-deceptiongrid-platform-dlja-proizvoditelja-po","roi":0,"seo":{"title":"TrapX DeceptionGrid Platform для производителя ПО","keywords":"были, DeceptionGrid, несколько, безопасности, программное, технологии, обеспечение, точек","description":"Атаки нацелены на ведущего вендра программного обеспечения\r\rПредыстория проекта - оценка технологии\r\rВедущий поставщик программного обеспечения предоставляет","og:title":"TrapX DeceptionGrid Platform для производителя ПО","og:description":"Атаки нацелены на ведущего вендра программного обеспечения\r\rПредыстория проекта - оценка технологии\r\rВедущий поставщик программного обеспечения предоставляет"},"deal_info":"","user":{"id":4195,"title":"Hidden user","logoURL":"https://old.b4r.io/uploads/roi/company/hidden_user.jpg","alias":"skrytyi-polzovatel","address":"","roles":[],"description":"User Information is confidential ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":13,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hidden user","keywords":"Hidden, user, User, Information, confidential","description":"User Information is confidential ","og:title":"Hidden user","og:description":"User Information is confidential ","og:image":"https://old.b4r.io/uploads/roi/company/hidden_user.jpg"},"eventUrl":""},"supplier":{},"vendors":[{"id":3890,"title":"TrapX","logoURL":"https://old.b4r.io/uploads/roi/company/TrapX.png","alias":"trapx","address":"","roles":[],"description":"TrapX has created a new generation of deception technology that provides real-time breach detection and prevention. Our field proven solution deceives would-be attackers with turn-key decoys (traps) that “imitate” your true assets. Hundreds or thousands of traps can be deployed with little effort, creating a virtual mine field for cyberattacks, alerting you to any malicious activity with actionable intelligence immediately.","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":1,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":9,"vendorPartnersCount":0,"supplierPartnersCount":1,"b4r":0,"categories":{},"companyUrl":"https://trapx.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"TrapX","keywords":"with, TrapX, field, that, traps, little, creating, deployed","description":"TrapX has created a new generation of deception technology that provides real-time breach detection and prevention. Our field proven solution deceives would-be","og:title":"TrapX","og:description":"TrapX has created a new generation of deception technology that provides real-time breach detection and prevention. Our field proven solution deceives would-be","og:image":"https://old.b4r.io/uploads/roi/company/TrapX.png"},"eventUrl":""}],"products":[{"id":1724,"logo":false,"scheme":false,"title":"TrapX DeceptionGrid platform","vendorVerified":0,"rating":"3.30","implementationsCount":9,"suppliersCount":0,"alias":"trapx-deceptiongrid-platform1","companyTypes":[],"description":"<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">The TrapX DeceptionGrid platform protects your valuable assets against a multitude of attacks including malicious insiders and sophisticated cybercriminals.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">The Deception Product of Choice</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">DeceptionGrid’s depth and breadth of deception capability is unmatched. Our powerful architecture presents the deception attack surfaces that best match attacker activity. Learn more below.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Console with Attack Visualization</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">New expanded visualization enables the security operations team to rapidly understand the activities of the attacker over time, from the originating intrusion to the assets they are engaging with, to the final containment.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Attacker ID</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">New attack identification automatically determines if an attack is being conducted by a human attacker, or automated attack tools, giving security teams a better understanding of the attack and subsequent containment methods.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Automated Provisioning</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\"> Automated Provision of Deception Components. DeceptionGrid scans your existing network and provisions hundreds-to-thousands of deception components including Tokens (lures) and Traps (decoys).</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Deception Tokens</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Deception Tokens (lures) appear as ordinary files, scripts and databases, are embedded within real IT assets to bait and divert attackers.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Active Traps</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">New active traps functionality creates a stream of false network traffic between deployed traps to confuse and divert attackers that monitor the network traffic.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Emulated Traps</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Medium Interaction Emulated Traps</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Our patented emulated traps can be deployed at the largest enterprise scale through automation. You can select from a wide variety of servers, databases, workstations, switches, routers and more.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Industry Templates</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">The patented medium interaction traps now include expanded templates for specialized devices based on industries. These templates include, ATM’s and SWIFT assets for financial services, or Point of Sale (PoS) devices for retail, as well as devices for medical, manufacturing and many more, allowing customers to determine if attackers are targeting specialized devices that are often vulnerable to attack.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">FullOS Traps</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">High Interaction (Full Operating System) Traps</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">DeceptionGrid enables the provision of full operating system (fullOS) traps. Our medium interaction traps automatically extend engaged attackers through our smart deception to our fullOS decoys for the deepest attacker diversion and engagement. FullOS traps also enable customers to clone existing assets – you can completely replicate actual production servers to further deceive attackers.</span>\r\n","shortDescription":"The TrapX DeceptionGrid protects your valuable assets against a multitude of attacks including malicious insiders, lateral-movement, Advanced Persistent Threats (APTs) and sophisticated cybercriminals","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":12,"sellingCount":8,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"DeceptionGrid protects your valuable assets against a multitude of attacks including malicious insiders, lateral-movement","keywords":"from, TrapX, DeceptionGrid, breach, attack, platform, intelligence, remediation, protects, assets, malicious insiders, lateral-movement, Advanced Persistent Threats (APTs), sophisticated cybercriminals, Console, Attack Visualization, security operations team, intrusion, Attacker ID, attack identification, human attacker, automated attack tools, security teams, Automated Provisioning, Deception Tokens, Active Traps, Emulated Traps, Medium Interaction Emulated Traps, FullOS Traps, High Interaction (Full Operating System) Traps","description":"The TrapX DeceptionGrid platform protects your valuable assets against a multitude of attacks including malicious insiders and sophisticated cybercriminals.","og:title":"DeceptionGrid protects your valuable assets against a multitude of attacks including malicious insiders, lateral-movement","og:description":"The TrapX DeceptionGrid platform protects your valuable assets against a multitude of attacks including malicious insiders and sophisticated cybercriminals."},"eventUrl":"","translationId":1723,"dealDetails":{"avgPartnerDiscount":30,"dealProtection":1,"avgDealSize":30000,"dealSizeCurrency":"","avgDealClosing":3},"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"It is required to transfer the customer data to the vendor in order to receive a testing version for 30 days","categories":[{"id":199,"title":"Deception Techniques and Honeypots","alias":"deception-techniques-and-honeypots","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/simulation-and-trap-technologies.png"},{"id":204,"title":"Managed Detection and Response","alias":"managed-detection-and-response","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/threat-detection-and-response.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":384,"title":"Risk of attacks by hackers"},{"id":385,"title":"Risk of data loss or damage"},{"id":386,"title":"Risk of lost access to data and IT systems"}]}},"categories":[{"id":199,"title":"Deception Techniques and Honeypots","alias":"deception-techniques-and-honeypots","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/simulation-and-trap-technologies.png"},{"id":204,"title":"Managed Detection and Response","alias":"managed-detection-and-response","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/threat-detection-and-response.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://trapx.com/wp-content/uploads/2017/08/Case_Study_TrapX_Software.pdf","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},"trapx-deceptiongrid-platform-dlja-strakhovoi-otrasli":{"id":428,"title":"TrapX DeceptionGrid Platform для страховой отрасли","description":"<span style=\"font-weight: bold;\">Целевая атака на данные аутентификации</span>\r\n<span style=\"font-weight: bold;\">Предыстория проекта - оценка технологии</span>\r\nВ нашем финансовом исследовании основное внимание уделяется глобальному страховому учреждению. До этого времени абсолютно никаких индикаторов заражения вредоносными программами или постоянных угроз, видимых клиенту, не было. У клиента была обширная комплектация продуктов для защиты от кибер атак, которая включала брандмауэр, антивирусы, программное обеспечение для обнаружения вторжений, Endpoint и другое программное обеспечение.\r\nВ течение короткого периода времени TrapX DeceptionGrid создал ALERTS и идентифицировал два злонамеренных отдельных процесса, связанных с неавторизованным боковым движением в сети страховой компании.\r\nПосле анализа было установлено, что оба этих вредоносных процесса связывались с несколькими точками соединения в России.\r\nЭти точки соединения в России и другое вложенное программное обеспечение взяты вместе как расширенный перехватчик паролей. Нападавшие открыли сеть и записали информацию о пароле. Это адресная кража учетных данных для проверки подлинности представляла собой серьезную угрозу целостности общих операций компании. В настоящее время он не определил, в какой степени пароли были захвачены до обнаружения.\r\nДругие вредоносные программы с меньшим уровнем риска, идентифицированные DeceptionGrid, включают Trj / Downloader.LEK Trojan, Trojan_QHOST.DB Trojan и червь W32.Greypack. Все они не были обнаружены клиентами существующего кибер-пакета. Анализ предполагает, что, по крайней мере, один из них мог быть обнаружен, но оповещения были пропущены против объема общего трафика.\r\n<span style=\"font-weight: bold;\">Критические и конфиденциальные учетные данные под угрозой</span>\r\nTrapX определил, что критически важные и конфиденциальные данные пароля были отправлены в Россию. В настоящее время масштабы компрометации данных все еще недостаточно изучены, и глобальная страховая фирма взяла на себя превентивные меры по замене полномочий на подозрительные программные системы.\r\n","alias":"trapx-deceptiongrid-platform-dlja-strakhovoi-otrasli","roi":0,"seo":{"title":"TrapX DeceptionGrid Platform для страховой отрасли","keywords":"были, TrapX, программное, обеспечение, данные, DeceptionGrid, соединения, конфиденциальные","description":"Целевая атака на данные аутентификации\rПредыстория проекта - оценка технологии\rВ нашем финансовом исследовании основное внимание уделяется глобальному","og:title":"TrapX DeceptionGrid Platform для страховой отрасли","og:description":"Целевая атака на данные аутентификации\rПредыстория проекта - оценка технологии\rВ нашем финансовом исследовании основное внимание уделяется глобальному"},"deal_info":"","user":{"id":4195,"title":"Hidden user","logoURL":"https://old.b4r.io/uploads/roi/company/hidden_user.jpg","alias":"skrytyi-polzovatel","address":"","roles":[],"description":"User Information is confidential ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":13,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hidden user","keywords":"Hidden, user, User, Information, confidential","description":"User Information is confidential ","og:title":"Hidden user","og:description":"User Information is confidential ","og:image":"https://old.b4r.io/uploads/roi/company/hidden_user.jpg"},"eventUrl":""},"supplier":{},"vendors":[{"id":3890,"title":"TrapX","logoURL":"https://old.b4r.io/uploads/roi/company/TrapX.png","alias":"trapx","address":"","roles":[],"description":"TrapX has created a new generation of deception technology that provides real-time breach detection and prevention. Our field proven solution deceives would-be attackers with turn-key decoys (traps) that “imitate” your true assets. Hundreds or thousands of traps can be deployed with little effort, creating a virtual mine field for cyberattacks, alerting you to any malicious activity with actionable intelligence immediately.","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":1,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":9,"vendorPartnersCount":0,"supplierPartnersCount":1,"b4r":0,"categories":{},"companyUrl":"https://trapx.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"TrapX","keywords":"with, TrapX, field, that, traps, little, creating, deployed","description":"TrapX has created a new generation of deception technology that provides real-time breach detection and prevention. Our field proven solution deceives would-be","og:title":"TrapX","og:description":"TrapX has created a new generation of deception technology that provides real-time breach detection and prevention. Our field proven solution deceives would-be","og:image":"https://old.b4r.io/uploads/roi/company/TrapX.png"},"eventUrl":""}],"products":[{"id":1724,"logo":false,"scheme":false,"title":"TrapX DeceptionGrid platform","vendorVerified":0,"rating":"3.30","implementationsCount":9,"suppliersCount":0,"alias":"trapx-deceptiongrid-platform1","companyTypes":[],"description":"<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">The TrapX DeceptionGrid platform protects your valuable assets against a multitude of attacks including malicious insiders and sophisticated cybercriminals.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">The Deception Product of Choice</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">DeceptionGrid’s depth and breadth of deception capability is unmatched. Our powerful architecture presents the deception attack surfaces that best match attacker activity. Learn more below.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Console with Attack Visualization</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">New expanded visualization enables the security operations team to rapidly understand the activities of the attacker over time, from the originating intrusion to the assets they are engaging with, to the final containment.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Attacker ID</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">New attack identification automatically determines if an attack is being conducted by a human attacker, or automated attack tools, giving security teams a better understanding of the attack and subsequent containment methods.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Automated Provisioning</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\"> Automated Provision of Deception Components. DeceptionGrid scans your existing network and provisions hundreds-to-thousands of deception components including Tokens (lures) and Traps (decoys).</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Deception Tokens</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Deception Tokens (lures) appear as ordinary files, scripts and databases, are embedded within real IT assets to bait and divert attackers.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Active Traps</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">New active traps functionality creates a stream of false network traffic between deployed traps to confuse and divert attackers that monitor the network traffic.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Emulated Traps</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Medium Interaction Emulated Traps</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">Our patented emulated traps can be deployed at the largest enterprise scale through automation. You can select from a wide variety of servers, databases, workstations, switches, routers and more.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">Industry Templates</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">The patented medium interaction traps now include expanded templates for specialized devices based on industries. These templates include, ATM’s and SWIFT assets for financial services, or Point of Sale (PoS) devices for retail, as well as devices for medical, manufacturing and many more, allowing customers to determine if attackers are targeting specialized devices that are often vulnerable to attack.</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">FullOS Traps</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold;\">High Interaction (Full Operating System) Traps</span>\r\n<span style=\"color: #000000; font-family: Verdana, sans-serif; font-size: 12px;\">DeceptionGrid enables the provision of full operating system (fullOS) traps. Our medium interaction traps automatically extend engaged attackers through our smart deception to our fullOS decoys for the deepest attacker diversion and engagement. FullOS traps also enable customers to clone existing assets – you can completely replicate actual production servers to further deceive attackers.</span>\r\n","shortDescription":"The TrapX DeceptionGrid protects your valuable assets against a multitude of attacks including malicious insiders, lateral-movement, Advanced Persistent Threats (APTs) and sophisticated cybercriminals","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":12,"sellingCount":8,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"DeceptionGrid protects your valuable assets against a multitude of attacks including malicious insiders, lateral-movement","keywords":"from, TrapX, DeceptionGrid, breach, attack, platform, intelligence, remediation, protects, assets, malicious insiders, lateral-movement, Advanced Persistent Threats (APTs), sophisticated cybercriminals, Console, Attack Visualization, security operations team, intrusion, Attacker ID, attack identification, human attacker, automated attack tools, security teams, Automated Provisioning, Deception Tokens, Active Traps, Emulated Traps, Medium Interaction Emulated Traps, FullOS Traps, High Interaction (Full Operating System) Traps","description":"The TrapX DeceptionGrid platform protects your valuable assets against a multitude of attacks including malicious insiders and sophisticated cybercriminals.","og:title":"DeceptionGrid protects your valuable assets against a multitude of attacks including malicious insiders, lateral-movement","og:description":"The TrapX DeceptionGrid platform protects your valuable assets against a multitude of attacks including malicious insiders and sophisticated cybercriminals."},"eventUrl":"","translationId":1723,"dealDetails":{"avgPartnerDiscount":30,"dealProtection":1,"avgDealSize":30000,"dealSizeCurrency":"","avgDealClosing":3},"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"It is required to transfer the customer data to the vendor in order to receive a testing version for 30 days","categories":[{"id":199,"title":"Deception Techniques and Honeypots","alias":"deception-techniques-and-honeypots","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/simulation-and-trap-technologies.png"},{"id":204,"title":"Managed Detection and Response","alias":"managed-detection-and-response","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/threat-detection-and-response.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":384,"title":"Risk of attacks by hackers"},{"id":385,"title":"Risk of data loss or damage"},{"id":386,"title":"Risk of lost access to data and IT systems"}]}},"categories":[{"id":199,"title":"Deception Techniques and Honeypots","alias":"deception-techniques-and-honeypots","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/simulation-and-trap-technologies.png"},{"id":204,"title":"Managed Detection and Response","alias":"managed-detection-and-response","description":"","materialsDescription":"","iconURL":"https://old.b4r.io/fileadmin/user_upload/threat-detection-and-response.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://trapx.com/wp-content/uploads/2017/08/Case_Study_TrapX_Finance_Insurance.pdf","title":"Web-site of vendor"}},"comments":[],"referencesCount":0}},"aliases":{"1":["trapx-deception-grid-for-manufacturer-of-steel-products","trapx-deceptiongrid-platform-for-financial-industry","trapx-deceptiongrid-platform-for-law-enforcement","trapx-deceptiongrid-platform-for-national-government","trapx-deceptiongrid-platform-for-software-vendor","trapx-deceptiongrid-platform-dlja-pravitelstvennoi-organizacii","trapx-deceptiongrid-platform-dlja-pravookhranitelnykh-organov","trapx-deceptiongrid-platform-dlja-proizvoditelja-po","trapx-deceptiongrid-platform-dlja-strakhovoi-otrasli"]},"links":{"first":"http://b4r_be/api/implementations?page=1","last":"http://b4r_be/api/implementations?page=1","prev":null,"next":null},"meta":{"current_page":1,"from":1,"last_page":1,"path":"http://b4r_be/api/implementations","per_page":20,"to":9,"total":9},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}