Cybersecurity Firm Illusive Protects by Deception

Illusive networks, an Israeli cybersecurity firm launched just a few months ago, has captured the attention of investors and companies with its novel approach to protecting networks. An approach that illusive networks CEO Shlomo Touboul believes will leave hackers “caught with their pants down.”

The system relies on deceptions that are installed on “every endpoint, server and network component” of the customer’s network. These deceptions are triggered when a malicious hacker stumbles across or acts on them, which automatically launches a forensic application that produces a detailed report allowing the company to detect and contain the attack in its very easy stages.

What results from all of this, Touboul says, is a system that returns “almost no false positives.
“Today’s headlines confirm the need for a completely new approach to stopping cyber attackers,” Touboul said in a statement. “Illusive networks creates a hall of mirrors where attackers can no longer determine what’s real and what’s false.”
The “hall of mirrors” strategy is definitely attracting attention. After launching with a $5 million Series A in June, the company announced today that it has just closed a $22 million Series B let by New Enterprise Associates (NEA). Bessemer Venture Partners, Marker LLC , Citi Ventures, and Eric Schmidt’s Innovation Endeavors also participated in the round.

Kittu Kolluri, a General Partner at NEA believes that illusive network’s unique approach will really take the industry by storm.
“Established security approaches, such as perimeter defense and old school honeypots, are failing to protect networks,” Kolluri said in a statement. “Illusive networks has a uniquely innovative vision, scalable architecture, and some of the best security DNA out there. We are thrilled to partner with the team to take deception-based technology to the next level.”
Techcrunch: http://tcrn.ch/1hQ9871
 

 

« Technology Will Transform Human Expertise
Cyber Wars Won't Replace or Trigger Traditional Wars »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Malware.lu

Malware.lu

Malware.lu is a repository of malware and technical analysis. The goal of the project is to provide samples and technical analysis to security researchers.

Cleo

Cleo

Cleo is a leader in secure information integration, enabling both ease and excellence in business data movement and orchestration.

Centripetal Networks

Centripetal Networks

Centripetal Networks was founded with one vision - to protect networks from advanced threats by simplifying intelligence-driven security.

Cyber Security Expo

Cyber Security Expo

Cyber Security EXPO is a unique one day recruitment event for the cyber security industry.

Cyber Seguridad (Cyberseg)

Cyber Seguridad (Cyberseg)

Cyberseg provides specialized Cybersecurity services, including managed services (SOC / CERTs) and solutions for the protection of critical infrastructures.

Sentropi

Sentropi

Sentropi is an online protection solution against charge backs, account takeovers, identity thefts and online scams.

Independent Security Evaluators (ISE)

Independent Security Evaluators (ISE)

ISE is an independent security consulting firm headquartered in Baltimore, Maryland dedicated to securing high value assets for global enterprises and performing groundbreaking security research.

Cyverse

Cyverse

Cyverse is a cyber-security firm which provides corporations with state-of-the-art cyber-security service-based and technological solutions made in Israel.

SKKU Security Lab (seclab)

SKKU Security Lab (seclab)

SKKU Security Lab supports research and education in information security engineering. The lab is a part of the College of Software, Sungkyunkwan University.

Greenwave Systems

Greenwave Systems

Greenwave's AXON Platform enables IoT and M2M network service providers to address security, interoperability, flexibility and scalability from a single IoT platform.

ABS Group

ABS Group

ABS Group provides risk and reliability solutions and technical services that help clients confirm the safety, integrity and security of critical assets and operations.

Kentik

Kentik

Kentik - one platform for Network Visibility, Performance, and Security.

Wayra

Wayra

Wayra connects Telefónica and technological disruptors around the world. As their preferred strategic partner, we scale them up to accelerate their business and ours.

Summit 7 (S7)

Summit 7 (S7)

Summit 7 is a national leader in cybersecurity, compliance, and managed services for the Aerospace and Defense industry and corporate enterprises.

Cloud Software Group

Cloud Software Group

Cloud Software Group provides mission-critical software to enterprises at scale.

Synergy ECP

Synergy ECP

Synergy ECP has a talented, dedicated staff to provide a broad range of services to the defense and intelligence industries.