Cybersecurity Firm Illusive Protects by Deception

Illusive networks, an Israeli cybersecurity firm launched just a few months ago, has captured the attention of investors and companies with its novel approach to protecting networks. An approach that illusive networks CEO Shlomo Touboul believes will leave hackers “caught with their pants down.”

The system relies on deceptions that are installed on “every endpoint, server and network component” of the customer’s network. These deceptions are triggered when a malicious hacker stumbles across or acts on them, which automatically launches a forensic application that produces a detailed report allowing the company to detect and contain the attack in its very easy stages.

What results from all of this, Touboul says, is a system that returns “almost no false positives.
“Today’s headlines confirm the need for a completely new approach to stopping cyber attackers,” Touboul said in a statement. “Illusive networks creates a hall of mirrors where attackers can no longer determine what’s real and what’s false.”
The “hall of mirrors” strategy is definitely attracting attention. After launching with a $5 million Series A in June, the company announced today that it has just closed a $22 million Series B let by New Enterprise Associates (NEA). Bessemer Venture Partners, Marker LLC , Citi Ventures, and Eric Schmidt’s Innovation Endeavors also participated in the round.

Kittu Kolluri, a General Partner at NEA believes that illusive network’s unique approach will really take the industry by storm.
“Established security approaches, such as perimeter defense and old school honeypots, are failing to protect networks,” Kolluri said in a statement. “Illusive networks has a uniquely innovative vision, scalable architecture, and some of the best security DNA out there. We are thrilled to partner with the team to take deception-based technology to the next level.”
Techcrunch: http://tcrn.ch/1hQ9871
 

 

« Technology Will Transform Human Expertise
Cyber Wars Won't Replace or Trigger Traditional Wars »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

TrustedIA

TrustedIA

TrustedIA is a cyber and protective security company. Our mission is to help businesses protect themselves from disruptive events that can impact their successful operation.

Executive Women's Forum (EWF)

Executive Women's Forum (EWF)

The Executive Women's Forum is the largest member organization serving emerging leaders and influential female executives in the Information Security, Risk Management and Privacy industries.

Open Information Security Foundation (OISF)

Open Information Security Foundation (OISF)

OISF is a non-profit organization led by world-class security experts, programmers, and others dedicated to open source security technologies.

Viasat

Viasat

Viasat is a provider of high-speed satellite broadband services and secure networking systems covering military and commercial markets.

Tutamantic

Tutamantic

Tutamantic develops software that reduces security risks and weaknesses during the architectural and design stages.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

Consensys

Consensys

ConsenSys is a global blockchain company. We develop enterprise applications, invest in startups, build developer tools, and offer blockchain education.

In-Sec-M

In-Sec-M

In-Sec-M is a non-profit organization that brings together companies, learning and research institutions, and government actors to increase competitiveness of the Canadian cybersecurity industry.

Visium Technologies

Visium Technologies

Visium Analytics provides innovative data visualization, cybersecurity technologies and solutions to businesses to protect and secure their data assets.

FraudLabs Pro

FraudLabs Pro

FraudLabs Pro detects fraud and helps merchants to reduce e-commerce chargebacks by identifying high risk transactions.

ENSCO

ENSCO

The ENSCO group of companies provides engineering, science and advanced technology solutions that guarantee mission success, safety and security to governments and private industries worldwide.

Acumera

Acumera

Acumera is a leader in managed network security, visibility and automation services.

Identity Digital

Identity Digital

Identity Digital simplifies and connects a fragmented online world with domain names and related technologies that allow people and businesses to build, market and own their digital identities.

Cloud Software Group

Cloud Software Group

Cloud Software Group provides mission-critical software to enterprises at scale.

Zeus Cloud

Zeus Cloud

Zeus Cloud provide clients with world-class web hosting services to businesses both big and small.

Apex

Apex

We aspire to make the AI revolution run faster, securely, for the benefit of all. We are purposely built for the new AI era and are creating capabilities to safely enable AI.