Tech Library is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

TECH DIGITAL RESOURCE LIBRARY

Illusive Networks

Illusive Networks empowers security teams to reduce business risk from today's advanced, targeted threats by destroying an attacker's ability to move laterally within networks. Illusive preempts attacks by shrinking the attack surface, detects unauthorized lateral movement early in the attack, and provides real-time forensics that enhance response. Agentless and automated, Illusive technology enables organizations to proactively intervene in the attack process to avoid operational disruption, while functioning with greater confidence in today's complex, hyper-connected world.

Headquarters: Tel Aviv, Israel
Our Website: https://www.illusivenetworks.com/


Latest Content From Illusive Networks

Whitepaper: Use Cases for Attack Surface Manager (ASM)

by Illusive NetworksApr 15, 2019

Learn how Illusive's customers are using ASM to stop the spread of credentials and connections, preemptively hardening the network.


Whitepaper: 2019 Cyberthreat Defense Report

by Illusive NetworksApr 03, 2019

Now it its sixth year, the annual Cyberthreat Defense Report by CyberEdge Group provides the most comprehensive view of IT security from over 1,200 IT security decision makers and practitioners across 17 countries, representing 19 industries. Download the report to find out more about:

• The most-wanted security management and operations technology for 2019
• Why ransomware concerns are on the rise... again
• Which security processes organizations struggle with the most
• How organizations are trying to detect advanced cyberthreats more quickly

Illusive Networks is once again proud to sponsor this important research to help security leaders asses and shape their cybersecurity programs.


Research Report: Ponemon Study: Managing the Risk of Post-breach or "Resident" Attacks

by Illusive NetworksNov 14, 2018

How well-equipped is your organization to stop insider attacks or external attackers once they're inside your network? According to this study, almost two-thirds of respondents lack efficient capabilities to detect and investigate "stealth" attackers before serious damage occurs.

This report, summarizing insights provided by over 600 IT and IT security professionals, sheds light on:

•The challenge to align security programs with top business risk priorities
•Primary obstacles to better threat detection and incident response
•How well organizations are hardening their environments against lateral movement
•How cybersecurity budgets are changing to address the reality that attackers will get in


Research Report: 2018 Cyberthreat Defense Report

by Illusive NetworksOct 31, 2018

Is the number of cyber incidents trending up or down? What threats are top-of-mind? How are MSSPs and threat intelligence being utilized? What are the biggest obstacles to better cyber defense? How are organizations addressing the risks introduced by new tech trends? What are the hottest cybersecurity technologies being considered?

To better understand the perceptions and priorities of security decision-makers and practitioners, CyberEdge has released it's fifth annual Cyberthreat Defense Report summarizing data and findings from their annual survey. This year, 1200 IT security decision makers and practitioners participated from 17 contries, six continents, and 19 industries.

Illusive is once again proud to sponsor this important research to help security leaders assess and shape their cybersecurity programs.


Whitepaper: A Deception Approach to Protecting ATM Networks

by Illusive NetworksAug 28, 2018

The most damaging ATM attacks start through the corporate network. Learn how deception helps protect ATM networks.


E-Book: Using Deception to Secure Dynamic Business During M&A

by Illusive NetworksAug 28, 2018

Distributed deception is uniquely suited to protect businesses during M&A and times of high IT infrastructure volatility.


Whitepaper: Discover Hidden Credentials, Harden Your Network Against Silent Attackers

by Illusive NetworksMay 16, 2018

The spread of credentials creates an attacker-friendly network. Learn how to gain visibility and improve cyber hygiene.


Whitepaper: Three Use Cases for Deception Technology in Healthcare

by Illusive NetworksMar 01, 2018

Read how distributed deception can address some of the most pressing cyber risk challenges among health care providers and insurance plan companies.


Whitepaper: Three Use Cases for Deception Technology in Financial Services

by Illusive NetworksMar 01, 2018

Learn how deception technology can be used to prevent fraud, provide protection during M&A, and help plug gaps for 'untouchable' systems.


Whitepaper: Deception Comes of Age: Essential for Securing Dynamic Business Environments

by Illusive NetworksMar 01, 2018

This paper shows how intelligent automation is enabling mature, distributed deception solutions that can scale and adapt to meet today's business demands.