Cybersecurity Firm Illusive Protects by Deception

Illusive networks, an Israeli cybersecurity firm launched just a few months ago, has captured the attention of investors and companies with its novel approach to protecting networks. An approach that illusive networks CEO Shlomo Touboul believes will leave hackers “caught with their pants down.”

The system relies on deceptions that are installed on “every endpoint, server and network component” of the customer’s network. These deceptions are triggered when a malicious hacker stumbles across or acts on them, which automatically launches a forensic application that produces a detailed report allowing the company to detect and contain the attack in its very easy stages.

What results from all of this, Touboul says, is a system that returns “almost no false positives.
“Today’s headlines confirm the need for a completely new approach to stopping cyber attackers,” Touboul said in a statement. “Illusive networks creates a hall of mirrors where attackers can no longer determine what’s real and what’s false.”
The “hall of mirrors” strategy is definitely attracting attention. After launching with a $5 million Series A in June, the company announced today that it has just closed a $22 million Series B let by New Enterprise Associates (NEA). Bessemer Venture Partners, Marker LLC , Citi Ventures, and Eric Schmidt’s Innovation Endeavors also participated in the round.

Kittu Kolluri, a General Partner at NEA believes that illusive network’s unique approach will really take the industry by storm.
“Established security approaches, such as perimeter defense and old school honeypots, are failing to protect networks,” Kolluri said in a statement. “Illusive networks has a uniquely innovative vision, scalable architecture, and some of the best security DNA out there. We are thrilled to partner with the team to take deception-based technology to the next level.”
Techcrunch: http://tcrn.ch/1hQ9871
 

 

« Technology Will Transform Human Expertise
Cyber Wars Won't Replace or Trigger Traditional Wars »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Puppet

Puppet

Puppet is a leader in IT automation. Our software helps DevOps securely automate configuration and management of machines and the software running on them.

SOTI

SOTI

SOTI is an industry leader in Enterprise Mobility Management (EMM).

CloudCodes Software

CloudCodes Software

CloudCodes is a cloud security solutions provider focused on providing cloud security solutions to enterprise customers.

Cyber Security Agency of Singapore (CSA)

Cyber Security Agency of Singapore (CSA)

The CSA is the national agency overseeing cybersecurity strategy, operation, education, outreach, and ecosystem development.

Puleng Technologies

Puleng Technologies

Puleng provides customers with a client-centric strategy to manage and secure the two most valuable assets an organisation has - its Data and Users.

VXRL

VXRL

VXRL is a Hong Kong-based cybersecurity company. We provide consulting services, penetration testing, and corporate training.

A3Sec

A3Sec

A3Sec provides professional solutions in the areas of Cybersecurity, Device Monitoring, Business Intelligence and Big Data.

Sayata Labs

Sayata Labs

Sayata delivers a streamlined solution for processing cyber policies. Increase profitability with an easy and intuitive platform.

Aristi Technologies

Aristi Technologies

Aristi provides cybersecurity risk and compliance services to help manage your unique cyber risks, safeguarding your systems and data and complying with government and industry standards.

IronClad Encryption (ICE)

IronClad Encryption (ICE)

Ironclad Encryption is Dynamic Encryption. The encryption sequence changes continuously so there is never a correlation between data sent and data received.

ArmorCode

ArmorCode

ArmorCode's intelligent application security platform gives us unified visibility into AppSec postures and automates complex DevSecOps workflows.

Coviant Software

Coviant Software

Coviant Software delivers secure managed file transfer (MFT) software that integrates smoothly and easily with business processes.

Policy Monitor

Policy Monitor

Policy Monitor is a cyber security company founded by experts with extensive experience in operational and risk management.

BlockSec

BlockSec

BlockSec is dedicated to building blockchain security infrastructure. The team is founded by top security researchers and experiencedexperts from both academia and industry.

Security Discovery

Security Discovery

Stay ahead of cyber threats with Security Discovery. We offer expert consulting, comprehensive services, and a powerful vulnerability monitoring SaaS platform.

Closed Door Security

Closed Door Security

Closed Door Security is the only cybersecurity team in the north of Scotland offering everything from IASME Certification to CREST-Accredited penetration testing.