SYS-CON MEDIA Authors: Liz McMillan, Zakia Bouachraoui, Elizabeth White, Pat Romanski, Yeshim Deniz

News Feed Item

Illusive Networks Speeds Market Adoption of Deception-based Cybersecurity with the Expansion of Its FirstMove Services

Leader in deception technology expands its suite of professional services, enabling partners and customers to more rapidly deploy, scale, and optimize deception-based solutions

NEW YORK and TEL AVIV, Israel, Aug. 13, 2018 /PRNewswire/ -- Illusive Networks, the award winning leader in deception-based cybersecurity, today announced the availability of its FirstMove services, the industry's first comprehensive set of professional and consulting services aimed at helping customers plan, deploy, and optimize a deception-based approach to cybersecurity. 

"At Illusive, service equals partnership. We strive to exceed our clients' and channel partners' expectations from the level of service they receive. This is why clients and channel partners report such excellent experiences when interacting with our Customer Success Engineers," stated Nir Greenberg, director of customer success at Illusive.

"As a provider of advanced cybersecurity solutions, Cyber Watch Systems views expert services as a critical component of our overall business model," said Steve Duncan, the president of Cyber Watch Systems. "We are happy to see Illusive introduce a framework that helps partners drive customer satisfaction while improving efficiency and increasing return on professional services, consulting and Tier-1 support models."

A full range of services to facilitate deployment, operation, and optimization of the industry's deception platform of choice.

By cloaking the entire environment with deceptive information, Illusive makes it virtually impossible for cyberattackers, once inside the network, to successfully move laterally toward critical information and systems. Attacks are thwarted in the earliest stages, reducing business risks associated with targeted attacks, insider threats, and APTs.

Illusive's Deceptions Everywhere® solution uses advanced machine learning to provide customized and ever-changing deceptions, while automating deployment and management. Customers value the system's swift, easy, scalable implementation, high-fidelity alerts, and the minimal staffing commitment required.

"FirstMove services allow customers to further increase efficiency, and speed detection of targeted attackers. Customers benefit from our broad industry insights in analyzing alerts and removing hidden risk factors from the network in ways no other provider, or technology can," added Greenberg.

Illusive FirstMove services map to each stage of an Illusive cyber defense program, from planning and deployment, to operation and the development of in-house expertise.

  • FirstMove Build allows customers to achieve success with early phase deployments. It includes planning, implementation, network discovery, identification of sensitive data and applications (crown jewels) and deception deployment. Customers will receive on-line and hands-on training and certification in operations and reporting. In addition, Illusive will aid in integration with the customer's current security technology stack.
  • FirstMove Preempt helps customers eliminate attack vectors and reduce their attack surface by removing unnecessary credentials and connections that enable lateral movement. Using Attack Surface Manager (ASM), experts analyze customer environments, identify weaknesses, and implement policies to perpetually improve and maintain cyber hygiene.
  • FirstMove Alert offers customers immediate insight into attacks. Illusive's forensic analysts, backed by advanced cyber threat researchers, assist customers in analyzing the severity and nature of events triggered from Illusive's platform, and offer advice on mitigation options and strategies.
  • FirstMove Co-Pilot provides an assigned technical account manager to assist with phased rollouts, ongoing removal of attack risk factors and continuous improvement and optimization of the Illusive solution.
  • FirstMove Excel ensures customers develop in-house expertise by deepening their deception knowledge and improving their ability to think like advanced attackers through advanced classroom and field-based training and coaching.

Key Benefits:

  • Faster and more efficient deployment, even in the face of resource constraints and staffing challenges
  • Reduction of the attack surface through the elimination of errant credentials and other artifacts that attackers use to fuel lateral movement
  • Development of in-house expertise in deception technology, attack surface reduction, and real-time forensic analysis
  • The ability to prioritize remediation by understanding the risk and criticality of each alert
  • Early detection of advanced attackers by improving their ability to identify and respond to Illusive's high-fidelity alerts

Illusive's FirstMove services are available immediately by contacting Illusive sales or an authorized Illusive reseller. Pricing is determined by scope of work.

Over the past 12 months, Illusive has received recognition by The Wall Street Journal in its inaugural Tech Companies to Watch, was honored by CRN's Tech Innovators Awards, named as one of CRN's '25 Coolest Network Security Vendors', by Momentum Partners as one of 10 cybersecurity companies on their Watch List and more recently, by InformationWeek as a Top Vendor to Watch in 2018.

About Illusive Networks

Illusive Networks is a pioneer of deception technology, empowering security teams to take informed action against advanced, targeted cyberattacks by detecting and disrupting lateral movement toward critical business assets early in the attack life cycle. Agentless and driven by intelligent automation, Illusive technology enables organizations to significantly increase proactive defense while adding almost no operational overhead. Illusive's Deceptions Everywhere® approach was conceived by cybersecurity experts with decades of combined experience in cyber warfare and cyber intelligence. With the ability to proactively intervene in the attack process, technology-dependent organizations can preempt significant operational disruption and business losses, and function with greater confidence in today's complex, hyper-connected world. For more information, visit us at www.illusivenetworks.com, contact us at [email protected] or follow on LinkedIn, @Illusivenw on Twitter and Facebook.

Cision View original content:http://www.prnewswire.com/news-releases/illusive-networks-speeds-market-adoption-of-deception-based-cybersecurity-with-the-expansion-of-its-firstmove-services-300695504.html

SOURCE Illusive Networks

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Serverless applications increase developer productivity and time to market, by freeing engineers from spending time on infrastructure provisioning, configuration and management. Serverless also simplifies Operations and reduces cost - as the Kubernetes container infrastructure required to run these applications is automatically spun up and scaled precisely with the workload, to optimally handle all runtime requests. Recent advances in open source technology now allow organizations to run Serv...
Take advantage of autoscaling, and high availability for Kubernetes with no worry about infrastructure. Be the Rockstar and avoid all the hurdles of deploying Kubernetes. So Why not take Heat and automate the setup of your Kubernetes cluster? Why not give project owners a Heat Stack to deploy Kubernetes whenever they want to? Hoping to share how anyone can use Heat to deploy Kubernetes on OpenStack and customize to their liking. This is a tried and true method that I've used on my OpenSta...
Kubernetes is a new and revolutionary open-sourced system for managing containers across multiple hosts in a cluster. Ansible is a simple IT automation tool for just about any requirement for reproducible environments. In his session at @DevOpsSummit at 18th Cloud Expo, Patrick Galbraith, a principal engineer at HPE, will discuss how to build a fully functional Kubernetes cluster on a number of virtual machines or bare-metal hosts. Also included will be a brief demonstration of running a Galer...
Signs of a shift in the usage of public clouds are everywhere. Previously, as organizations outgrew old IT methods, the natural answer was to try the public cloud approach; however, the public platform alone is not a complete solution. Complaints include unpredictable/escalating costs and mounting security concerns in the public cloud. Ultimately, public cloud adoption can ultimately mean a shift of IT pains instead of a resolution. That's why the move to hybrid, custom, and multi-cloud will ...
Isomorphic Software is the global leader in high-end, web-based business applications. We develop, market, and support the SmartClient & Smart GWT HTML5/Ajax platform, combining the productivity and performance of traditional desktop software with the simplicity and reach of the open web. With staff in 10 timezones, Isomorphic provides a global network of services related to our technology, with offerings ranging from turnkey application development to SLA-backed enterprise support. Leadin...
Take advantage of autoscaling, and high availability for Kubernetes with no worry about infrastructure. Be the Rockstar and avoid all the hurdles of deploying Kubernetes. So Why not take Heat and automate the setup of your Kubernetes cluster? Why not give project owners a Heat Stack to deploy Kubernetes whenever they want to? Hoping to share how anyone can use Heat to deploy Kubernetes on OpenStack and customize to their liking. This is a tried and true method that I've used on my OpenSta...
As you know, enterprise IT conversation over the past year have often centered upon the open-source Kubernetes container orchestration system. In fact, Kubernetes has emerged as the key technology -- and even primary platform -- of cloud migrations for a wide variety of organizations. Kubernetes is critical to forward-looking enterprises that continue to push their IT infrastructures toward maximum functionality, scalability, and flexibility. As they do so, IT professionals are also embr...
Emil Sayegh is an early pioneer of cloud computing and is recognized as one of the industry's true veterans. A cloud visionary, he is credited with launching and leading the cloud computing and hosting businesses for HP, Rackspace, and Codero. Emil built the Rackspace cloud business while serving as the company's GM of the Cloud Computing Division. Earlier at Rackspace he served as VP of the Product Group and launched the company's private cloud and hosted exchange services. He later moved o...
Using serverless computing has a number of obvious benefits over traditional application infrastructure - you pay only for what you use, scale up or down immediately to match supply with demand, and avoid operating any server infrastructure at all. However, implementing maintainable and scalable applications using serverless computing services like AWS Lambda poses a number of challenges. The absence of long-lived, user-managed servers means that states cannot be maintained by the service. Lo...
Cloud-Native thinking and Serverless Computing are now the norm in financial services, manufacturing, telco, healthcare, transportation, energy, media, entertainment, retail and other consumer industries, as well as the public sector. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long development cycles that pro...
The Japan External Trade Organization (JETRO) is a non-profit organization that provides business support services to companies expanding to Japan. With the support of JETRO's dedicated staff, clients can incorporate their business; receive visa, immigration, and HR support; find dedicated office space; identify local government subsidies; get tailored market studies; and more.
As you know, enterprise IT conversation over the past year have often centered upon the open-source Kubernetes container orchestration system. In fact, Kubernetes has emerged as the key technology -- and even primary platform -- of cloud migrations for a wide variety of organizations. Kubernetes is critical to forward-looking enterprises that continue to push their IT infrastructures toward maximum functionality, scalability, and flexibility. As they do so, IT professionals are also embr...
While a hybrid cloud can ease that transition, designing and deploy that hybrid cloud still offers challenges for organizations concerned about lack of available cloud skillsets within their organization. Managed service providers offer a unique opportunity to fill those gaps and get organizations of all sizes on a hybrid cloud that meets their comfort level, while delivering enhanced benefits for cost, efficiency, agility, mobility, and elasticity.
Kubernetes as a Container Platform is becoming a de facto for every enterprise. In my interactions with enterprises adopting container platform, I come across common questions: - How does application security work on this platform? What all do I need to secure? - How do I implement security in pipelines? - What about vulnerabilities discovered at a later point in time? - What are newer technologies like Istio Service Mesh bring to table?In this session, I will be addressing these commonly asked ...
In a recent survey, Sumo Logic surveyed 1,500 customers who employ cloud services such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). According to the survey, a quarter of the respondents have already deployed Docker containers and nearly as many (23 percent) are employing the AWS Lambda serverless computing framework. It's clear: serverless is here to stay. The adoption does come with some needed changes, within both application development and operations. Th...