DDoS Protection , Governance & Risk Management , Incident & Breach Response

Simplifying Advanced Attack Detection

New Deception Strategies from Ofer Israeli, CEO at Illusive Networks
Simplifying Advanced Attack Detection
Ofer Israeli, Illusive Networks

Despite the millions of dollars companies invest in cybersecurity programs, advanced persistent attackers constantly devise new means of breaking into corporate environments. How can deception technology offer a new alternative? Ofer Israeli of Illusive Networks explains.

"The reality is that you're talking about a very sophisticated group of individuals carrying out these advanced attacks - they are not going to be found by any trivial means," says Ofer, founder and CEO of Illusive. The key to deception technology is to deter lateral movement inside a network. "On each and every machine throughout the network, we can build a reality for the attacker that is different from the actual reality. That leads the attacker into learning [the network] incorrectly. And when you learn incorrectly, you act incorrectly."

In this interview about deception technology, Israeli discusses:

  • The strengths and weaknesses of various approaches to advanced attack detection;
  • The missing link most companies miss today;
  • How deception technology provides an alternative.

Israeli, a pioneer of deception-based cybersecurity, is among the wave of cyber technology visionaries and entrepreneurs helping to define the next evolution of cyber defense. As founder and CEO of Illusive Networks, he shaped Illusive's intelligence-driven, endpoint-based deception technology, which stops advanced attacks in progress by detecting and inhibiting the attacker's lateral movement once inside a network. Before establishing Illusive, he managed development teams based around the globe for Check Point Software Technologies, Israel's seminal cybersecurity company.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ffiec.bankinfosecurity.com, you agree to our use of cookies.