View
Sorting
From A to Z
Products found: 13
Acalvio Shadowplex
ShadowPlex Autonomous Deception
- Accurate Detection
- Timely Detection
- Cost-Effective Detection
- Threat Intelligence
- IT Change Management platforms
- SOAR (Security Orchestration and Response)
- SIEM
- Perimeter Defense
- NAC (Network Access Control)
- Vulnerability Managers
- SSO, Identity Management, Privileged User Management Systems
- EDR, End-point
-
-
ROI-
-
0
4
Attivo Networks ThreatDefend Platform™
Threat Deception Technology to Detect Threats Early, Accurately & Efficiently The ThreatDefend Deception Platform is a modular solution comprised of Attivo BOTsink® engagement servers, decoys, and deceptions, the ThreatStrikeTM endpoint deception suite, ThreatPathTM for attack path visibility, ThreatOpsTM incident response orchestration playbooks, and the Attivo Central Manager (ACM), which together create a comprehensive early detection and active defense against cyber threats. WHY CUSTOMERS CHOOSE THREAT DECEPTION
- EARLY WARNING SYSTEM
- ACTIONABLE ALERTS
- EASY TO DEPLOY
- LOW MAINTENANCE
- STRENGTHENS DEFENSES
- Customized using real OS and services to production assets
- Credential validation with Active Directory
- High-interaction engagement
- Self-learning of the environment generates deception campaigns
- Campaigns can be deployed on demand for environment refresh
- Allows automated refresh to spin up deception or avoid fingerprinting
- Simplify deployment with automated campaign proposals
- Easy operations with automated refresh
- Choice of on demand or automated campaign deployment
-
-
ROI-
-
5
7
CyberTrap
Our deception technology is designed with one purpose in mind – to stop attackers from breaching your system and causing damage. Our local threat intelligence feeds help to keep attackers out of your network. CyberTrap offers comfortable, stress-free 24/7 protection while gathering vital intelligence on attacker activities and intent.
- Local threat intelligence feeds
- Insight on attacker activities
- No false positives
- No capital investment
- No need to hire experts
- No overhead costs
- Easy integration with existing security stack
- All the necessary training provided
- Fast and reliable customer support
- Government & law enforcement agencies
- Banking, financial services & insurance (BFSI)
- IT, telecom & technology
- Utilities & and national critical infrastructure (CNI)
- Production plants & manufacturing
- E-commerce & retail chains
- Healthcare companies
-
-
ROI-
-
6
9
Cymmetria’s MazeRunner
- Get reliable detection.MazeRunner leads attackers away from real targets and creates a footprint of the attack
- Investigation Forensic.Improve incident response.MazeRunner provides rich forensic data and insights, such as the source of the attack and tools used by the attacker
- Real Alerts.Focus on real alerts.MazeRunner generates real, reliable alerts
- Mitigation. Quarantine and block attackers. MazeRunner gathers attack information and integrates with existing tools in the organization to quarantine and block attackers
-
-
ROI-
-
8
17
Fidelis Elevate
Fidelis Elevate™
Detect Post-Breach Attacks With an Active Deception Defense Fidelis Deception™ automatically profiles networks and assets to create deception layers that are as realistic as possible to detect post-breach attacks. Fidelis Network Module Leverage Curated Threat Intelligence for More Accurate Detection Fidelis Insight™ analyzes real-time and historical data, so you can rapidly detect and respond to threats in your environment, even when they happened in the past.
- Automate Detection
- Automate Response
- Prevent Data Theft
- Enrich alerts with data and context from Fidelis Network®, Fidelis Endpoint®, and Fidelis Deception™ – all in a unified platform
- Combine threat intelligence, sandboxing, machine learning, deception, and Fidelis research
- Capture and store metadata for analysis and threat hunting
- Draw conclusions with accuracy by automatically collapsing many alerts and events into a single view
- Automatically validate network alerts on the endpoint with certainty
- Raise the priority level when evidence is found of increased risk
- Automatically execute a response playbook to jumpstart your investigation with clarity
- Stop data leakage, command and control, and active attacks
Detect Post-Breach Attacks With an Active Deception Defense Fidelis Deception™ automatically profiles networks and assets to create deception layers that are as realistic as possible to detect post-breach attacks. Fidelis Network Module Leverage Curated Threat Intelligence for More Accurate Detection Fidelis Insight™ analyzes real-time and historical data, so you can rapidly detect and respond to threats in your environment, even when they happened in the past.
-
-
ROI-
-
13
8
GuardiCore Centra Security Platform
Reveal Application Flows Across the Infrastructure
Detect Threats Faster and Simplify Response
Protection For Your Entire Infrastructure, Built and Proven for Cloud Scale
- Automatically discover applications and flows
- Quickly understand application behavior
- Granular visibility down to the process level
- Define segmentation policies in minutes
- Automatic policy recommendations
- Consistent policy expression across any environment
Detect Threats Faster and Simplify Response
- Multiple detection methods cover all types of threats
- Dynamic deception immediately traps attackers
- High quality, in-context security incidents with mitigation recommendations to speed incident response
Protection For Your Entire Infrastructure, Built and Proven for Cloud Scale
- Hybrid Cloud. Workload protection in hybrid cloud environments that span on-premises workloads, VMs, containers and deployments in public cloud IaaS including AWS, Azure and GCP.
- Simplify Security. Simplify security management with one platform that provides flow visibility, micro-segmentation, threat detection and incident response.
- Enterprise Scalability. Scalable to meet the performance and security requirements of any sized environment
-
-
ROI-
-
16
3
IllusionBLACK
Stop Advanced Cyber Threats With Deception Technology By deploying hundreds of unique deception tripwires, IllusionBLACK maximises attack detection through the kill-chain, even against stealthy, targeted campaigns that don’t involve malware. From targeted threat intelligence of an impending attack, to detecting lateral movement in every single subnet, Smokescreen’s deception technology helps turn the tables on apex attackers. Full Kill-Chain Coverage IllusionBLACK decoys detect pre-attack reconnaissance, spear-phishing attacks, privilege escalation, lateral movement and data-theft. Deep Network Visibility Instantly deploy 100's of individually unique, customisable traps across all your endpoints and in every single subnet of your network. Attack Vector Agnostic Deception does not rely on static signatures or heuristics to identify attacks, so it stays effective no matter what the bad guys try tomorrow. IllusionBLACK detects threats no matter what they attack It has advanced 3rd generation deception features, including…
- MirageMaker™. Realistic auto-created decoy data fills deceptive assets with always unique, instantly changing content.
- ThreatParse™. Natural language attack reconstruction parses raw attack data into plain-English attack analysis.
- Automated triage. Agentless investigation of compromised endpoints to reduce root cause analysis time and capture volatile forensic information.
- WebDeflect™. Integrate deception into any web or mobile application to guard against business logic attacks.
- ThreatDeflect™. Redirect attacks to decoy cloud environments to keep attackers engaged while containment kicks in.
- Forensic preservation. All evidence recorded and preserved for further analysis in industry standard formats.
- Smart Integrations. Logic-driven automatic response and orchestration to execute response strategies at wire-speed.
- Hardened BSD UNIX base. Rock-solid security built for highly-targeted environments, coupled with BSD UNIX's legendary reliability.
- Threat intelligence export. Machine consumable through STIX, JSON and CSV, as well as integrations with other security infrastructure.
-
-
ROI-
-
7
3
Illusive Platform
Strengthen your resistance and—when attackers get in—cut them off before they reach your critical assets. Rapid, Sustainable Reduction of Cyber Attack Risk Protection from Targeted Attacks The Illusive platform is purpose-built to counter the methods of advanced attackers—while also alleviating burden on security teams. Illusive’s featherweight solution helps you:
- Understand your attack risk posture
- Harden the environment
- Detect attackers early
- Resolve incidents before attackers succeed
-
-
ROI-
-
5
8
TrapX DeceptionGrid platform
The TrapX DeceptionGrid platform protects your valuable assets against a multitude of attacks including malicious insiders and sophisticated cybercriminals.
The Deception Product of Choice
DeceptionGrid’s depth and breadth of deception capability is unmatched. Our powerful architecture presents the deception attack surfaces that best match attacker activity. Learn more below.
Console with Attack Visualization
New expanded visualization enables the security operations team to rapidly understand the activities of the attacker over time, from the originating intrusion to the assets they are engaging with, to the final containment.
Attacker ID
New attack identification automatically determines if an attack is being conducted by a human attacker, or automated attack tools, giving security teams a better understanding of the attack and subsequent containment methods.
Automated Provisioning
Automated Provision of Deception Components. DeceptionGrid scans your existing network and provisions hundreds-to-thousands of deception components including Tokens (lures) and Traps (decoys).
Deception Tokens
Deception Tokens (lures) appear as ordinary files, scripts and databases, are embedded within real IT assets to bait and divert attackers.
Active Traps
New active traps functionality creates a stream of false network traffic between deployed traps to confuse and divert attackers that monitor the network traffic.
Emulated Traps
Medium Interaction Emulated Traps
Our patented emulated traps can be deployed at the largest enterprise scale through automation. You can select from a wide variety of servers, databases, workstations, switches, routers and more.
Industry Templates
The patented medium interaction traps now include expanded templates for specialized devices based on industries. These templates include, ATM’s and SWIFT assets for financial services, or Point of Sale (PoS) devices for retail, as well as devices for medical, manufacturing and many more, allowing customers to determine if attackers are targeting specialized devices that are often vulnerable to attack.
FullOS Traps
High Interaction (Full Operating System) Traps
DeceptionGrid enables the provision of full operating system (fullOS) traps. Our medium interaction traps automatically extend engaged attackers through our smart deception to our fullOS decoys for the deepest attacker diversion and engagement. FullOS traps also enable customers to clone existing assets – you can completely replicate actual production servers to further deceive attackers.
The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.