The Silicon Review - Best Business Review Magazine 10 Best Security Companies 2019 | Page 44

I llusive brought together top cyber-attack specialists and pioneering cyber technology entrepreneurs with decades of collective experience in cyber warfare and cyber intelligence. It was built to tackle what has been a significant and urgent problem for cybersecurity practitioners— the challenge to stop Advanced Persistent Threats (APTs) and other advanced attacks that bypass security controls and silently gain access to organizations’ most risk- sensitive and business-critical digital assets. Given the frequency of successful targeted attacks, it decided not to continue with old approaches and expect to get different results. A new approach is needed. Illusive looks at the problem from the perspective of the attacker and exploits the attacker’s weakness. As fire needs oxygen, attackers – once they have found their way into a network — need reliable data that will lead them toward their target. By saturating the environment with deceptive information, Illusive creates a distorted reality that the attacker cannot confidently navigate. It’s a solution that disrupts the attacker’s operations — without disrupting yours. The company provides tools that help security teams detect and resolve advanced attacks, to prevent cyber incidents from becoming business crises. Deceptions in Financial Services Financial institutions are one of the most high-value targets for attackers who “follow the money” and those intent on systemic disruption. Despite the vast resources financial institutions devote to cybersecurity, one challenge has been especially difficult to solve: the challenge to detect and stop APTs before real damage is done. Deceptions in Healthcare and Life Sciences Whether your organization provides healthcare services, health insurance, or cutting-edge medical devices and therapies, health information systems have become increasingly digital, interconnected, and consumer- driven. In the process, they’ve also become attractive targets for data theft, identity theft, and insurance fraud and worse, as the recent spate of ransomware attacks has shown, cyber attacks on healthcare institutions can also disrupt vital services. The impact: loss of patient trusts, significant financial losses, regulatory scrutiny—and above all, the risk to patient safety. Deceptions in Legal Services Mergers and acquisitions, SEC filings, corporate restructuring, litigation, patent applications, employee contracts—everything important happen with legal counsel. Law firms traditionally have been underinvested in security defences, so they are easy targets for advanced cyber attackers. In many cases, law firms are much easier targets for attackers than the firm’s clients themselves. Deceptions in Manufacturing With relatively little PII and payment data to protect, many manufacturers have felt relatively safe from the cross hairs of attackers. However, cyber attackers see things differently. With large investments in Intellectual Property (IP) and the evolution of Industry 4.0, manufacturers have become attractive targets. Today’s smart manufacturing relies on connected networks for manufacturing operations, production asset management, maintenance, and field service. Internet of Things (IoT) devices are critical components of smart manufacturing processes for collecting, aggregating, and delivering data. Complex connected networks and IoT devices—plus extended supply chains—create vast opportunities for attackers to make their way in. Once embedded in the network, it may take an attacker weeks or month to find what they’re Focusing On the Attacker than the Attack Illusive Networks Agile approach stops cyber attackers before they stop you.