SC Labs examined 9 deception networks instruments that have dramatically enhanced in their skill to help companies proactively detect, hunt and react to threats. (Source: Attivo)
Editor’s Be aware: This established of reviews originally appeared in Oct 2020. To find out extra about SC Labs, call Adrian Sanabria at [email protected].
SC Labs took one more appear at deception networks instruments this past Oct. There was no lack of innovation or developments this calendar year and these solutions have extra effective, outstanding abilities. Deception networks equipment, in their most basic variety, develop decoy property, environments, and comprehensive-blown OSes. These collectively make a deception cloth in an ecosystem, which encourages adversaries to have interaction with the mimicked belongings compared to the true kinds, stopping dwelling-off-the-land attacks and details exfiltration.
All of these products have substantial equipment discovering features that provides a dynamic element to deception technology, alterations with each individual environment and retains speed with attackers. The realism of decoys lures in attackers and documents each action that occurs through the engagement to offer you security teams with a detailed being familiar with of the adversary and the strategies they employed. Security teams can then use this attack intelligence details to shut gaps and proactively reinforce defenses to prevent foreseeable future intrusions and infections.
We were being psyched to listen to that corporations are embracing these deception network equipment. The conversation has moved from educating people today on the fundamental principles of deception technology and examining device capabilities to providers actively generating extra aspect requests and giving comments on solutions. From that, it sounds like these powerful platforms are getting staples in security stacks. If deception network tools are still not on your listing, we confidently suggest that a company’s security posture will tremendously benefit from deploying one.
SC Labs took yet another search in October 2020 into deception networks instruments. These potent answers are frequently becoming progressively complex. We were being amazed with the advancement and innovation the resources have undergone considering that past calendar year and thrilled to see the new developments. Deception network resources are moving away from an emerging classification and steadily turning into far more commonplace as the understanding and recognition of these products and solutions carries on to distribute. These cautiously constructed platforms add incredible value to any firm that prioritizes the security of its environment and seems to be to bolster in general security posture.
Deception technologies are not a latest one and specific elements, these types of as honeypots, have been all over for decades. Having said that, the mother nature of deceptions has been through important variations in excess of time and continues to transfer further more from its original aims as an information and facts gathering and analytics software, and closer to a proactive risk detection, searching, and response platform. Security teams are hunting for additional from their deception items and demanding they do far more than just supply intelligence security teams want their deception tools to trigger automatic responses based mostly on the intelligence furnished to help have the stress of addressing security considerations and chopping through the at any time-current inform sounds.
The realism of these deception applications and the traps, decoys and breadcrumbs they hire keep on to acquire. The potential to generate deceptions that are indistinguishable from actual belongings and environments has attained a in close proximity to common degree. Machine finding out continues to spread in the course of the cybersecurity industry and deception applications are no exception. Many of the solutions we assessed this thirty day period have dynamic deception abilities that use device studying technology to reshape the network and generate much more decoys on the fly as adversaries have interaction with them, creating reconnaissance and fingerprinting pretty much unattainable. Security teams nevertheless have the flexibility and adaptability to create their very own deceptions without the need of compromising success, both from scratch, or utilizing predefined templates, with numerous of these solutions. Attack surfaces are continuously escalating, and the danger landscape carries on to establish, turning into extra highly developed and complex. Deception network applications are some of the most geared up answers to retain speed with these switching tactics and the adversaries that use them.
We are very fired up to see in which the continual growth and innovation can take deception networks instruments, specially now that they have grow to be additional regularly employed and a lot easier to take care of. Security teams will very likely be intrigued by the potential of the tools to mechanically and dynamically make around-ideal deception environments and maintain tempo with merciless adversaries. Thinking about the recently-refined risk response skills and automation functions, we feel deception network tools may certainly have the capability to become the catchall security applications the environment of cybersecurity so desperately requirements.
Acalvio Systems, Inc. ShadowPlex v5.2
Attivo Networks ThreatDefend System v5.
CounterCraft Cyber Deception System v2.6.
Misleading Bytes Lively Endpoint Deception v2020.04.01
Fidelis Deception v9.3
Illusive Networks Attack Detection Process v3.1.126
PacketViper, LLC Deception360 v5.
Smokescreen IllusionBLACK v4
TrapX Security, Inc. DeceptionGrid v7.