Cybersecurity Firm Illusive Protects by Deception

Illusive networks, an Israeli cybersecurity firm launched just a few months ago, has captured the attention of investors and companies with its novel approach to protecting networks. An approach that illusive networks CEO Shlomo Touboul believes will leave hackers “caught with their pants down.”

The system relies on deceptions that are installed on “every endpoint, server and network component” of the customer’s network. These deceptions are triggered when a malicious hacker stumbles across or acts on them, which automatically launches a forensic application that produces a detailed report allowing the company to detect and contain the attack in its very easy stages.

What results from all of this, Touboul says, is a system that returns “almost no false positives.
“Today’s headlines confirm the need for a completely new approach to stopping cyber attackers,” Touboul said in a statement. “Illusive networks creates a hall of mirrors where attackers can no longer determine what’s real and what’s false.”
The “hall of mirrors” strategy is definitely attracting attention. After launching with a $5 million Series A in June, the company announced today that it has just closed a $22 million Series B let by New Enterprise Associates (NEA). Bessemer Venture Partners, Marker LLC , Citi Ventures, and Eric Schmidt’s Innovation Endeavors also participated in the round.

Kittu Kolluri, a General Partner at NEA believes that illusive network’s unique approach will really take the industry by storm.
“Established security approaches, such as perimeter defense and old school honeypots, are failing to protect networks,” Kolluri said in a statement. “Illusive networks has a uniquely innovative vision, scalable architecture, and some of the best security DNA out there. We are thrilled to partner with the team to take deception-based technology to the next level.”
Techcrunch: http://tcrn.ch/1hQ9871
 

 

« Technology Will Transform Human Expertise
Cyber Wars Won't Replace or Trigger Traditional Wars »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CDW

CDW

CDW is a leading multi-brand provider of information technology solutions to business, government, education and healthcare customers in the United States, the United Kingdom and Canada.

Versasec

Versasec

Versasec is a leader in identity and access management, providing customers with security solutions for managing digital identities.

Computer Laboratory - University of Cambridge

Computer Laboratory - University of Cambridge

Computer security has been among the Laboratory’s research interests for many years, along with related topics such as cryptology

CYBERPOL

CYBERPOL

CYBERPOL's mission is to facilitate the widest possible mutual assistance between all cyber crime law enforcement authorities to help mitigate global cyber threats.

Efecte

Efecte

Efecte is a Nordic SaaS company specialized in IT Service Management, Self-Service, Identity Management and Access Governance solutions.

Cyber Defense Initiative Conference (CDIC)

Cyber Defense Initiative Conference (CDIC)

Cyber Defense Initiative Conference (CDIC) is one of the most distinguished Cybersecurity, Privacy and Information Security Conference in Thailand and Southeast Asia.

CyberWarrior

CyberWarrior

CyberWarrior deliver training and consulting for some of the world’s top brands and also partner with national systems integrators to augment their teams with our expertise.

Specops Software

Specops Software

Specops Software is a leading password management and authentication solution vendor.

ContraForce

ContraForce

ContraForce is a threat detection and response software providing complete visibility across cloud, network, endpoints, user, and email with the ability to target and block threats in real-time.

KSOC Labs

KSOC Labs

KSOC is an event-driven SaaS platform built to automatically remediate Kubernetes security risks.

Heartland Business Systems (HBS)

Heartland Business Systems (HBS)

Heartland Business Systems serves commercial, public sector and small to medium business with results-driven and dedicated information technology services.

DESCERT

DESCERT

DESCERT offers you an extended IT, cyber security, risk advisory & compliance audit team which provides strategic guidance, engineering and audit services.

SignMyCode

SignMyCode

SignMyCode is a one-stop shop for trusted and authentic code signing solutions to safeguard software.

RealDefense

RealDefense

RealDefense develops and markets various privacy, security and optimization technologies and services for consumers and small businesses.

Interlock

Interlock

Interlock are building blockchain-based security products that solve legacy web2 security issues - phishing and social engineering.

TriVigil

TriVigil

TriVigil offer a full-service, comprehensive cybersecurity approach specifically tailored to meet the unique needs of educational institutions.