Stop the threat of ransomware and APTs
Cybersense Deception detects intrusions into your corporate network early and accurately – preventing data theft, data encryption and extortion attempts.
Often the first or only security system to detect attacks.
Exposes attackers during the reconnaissance phase.
No additional software on clients or servers.
Works independently of existing security and IT infrastructure.
Can also be used in sub-areas of the corporate network.
Optimal Deception Strategy
Developed with patented AI process.
Cybersense Deception detects reconnaissance and propagation attempts and defeats attacks with AI-optimized Active Defense in your own network
It is widely known how attackers pursue their targets. Accordingly, we can prepare the field with our advanced deception technology: As soon as attackers have breached your IT security systems, they will try to explore your IT (Reconnaissance), propagate (Lateral Movement) and usually also extend their privileges (Privilege Escalation). This means they have to query the DNS and directory services or scan the IP networks. In order to expose them and divert them away from your data and servers, we position Breadcrumbs and Decoys as sensors and traps at the relevant points of your infrastructure: in the network, at the application level and in the Active Directory.
Breadcrumbs are perceived keys to success that attackers are looking for with their techniques and tools: Credentials, tokens, certificates, vulnerabilities or misconfigurations. As soon as a key search is underway, the Breadcrumbs make it visible and lead the attacker to the Decoy systems.
Decoys are specially created hosts (e.g. virtual servers) that resemble your real assets and are placed between them. As soon as an attacker interacts with a Decoy, Cybersense Deception raises the alert.
We have developed a patented process that uses AI methods such as machine learning to help us determine the optimal Deception Strategy for you.
Cybersense Deception is a highly effective attack detection for on-prem and cloud environments that can be deployed and operated very leanly. Without many alerts – with full data sovereignty. Our experts in the Managed Detection and Response Team provide ongoing support.
We lure attackers on false trails: away from your servers and data
In other words, we create context-specific Decoys that we distribute in your IT infrastructure to lure attackers on a false trail – diverting them away from your real servers and data. The hackers have no chance to distinguish Breadcrumbs and Decoys from the real targets: Our Decoys are fully functional servers that run independently of your productive network. And Cybersense Deception Management scatters the Breadcrumbs onto your network with no discernible pattern. The deployment itself is carried out via your software distribution.
- The result of misleading by a false appearance or trick.
- Malware that hijacks data. The attacker encrypts the data and demands a ransom for the decryption key.
- An "Advanced Persistent Threat" is a complex, particularly effective attack on critical system assets.
- IT infrastructure, which is operated in own data centers.
- Cloud bzw. Cloud Computing
- Mostly internet-based provision of servers, storage space, computer processing capacities or software as a service.
Alert fatigue? Not with Cybersense Deception
Our intrusion detection system is designed to avoid harmful alert fatigue which results from the otherwise typical masses of alerts that have to be processed daily. Cybersense Deception, on the other hand, only triggers an alert when a Breadcrumb or Decoy is used: via email, SMS and by connecting to existing systems (ticket system, SIEM, monitoring) or security fabrics from well-known manufacturers.
Therefore, you can be sure that the manpower required to operate Cybersense Deception is significantly less than with other intrusion detection approaches.
High workload? We offer Managed Services made to measure
You decide where the rare but meaningful Cybersense Deception alerts are sent: to your administrators, to our team, or both. The designated security experts will then analyze the alerts, follow them up and take all necessary measures to mitigate the threat.
Cybersense Professional Service –
Security concepts made to measure
With Cybersense Deception, we support you in rapidly detecting intrusions in your IT infrastructure. But what happens next?
What measures need to be taken to mitigate the threat? What do these measures involve in detail? How are responsibilities designated within our team? At what point are external resources called in and for what purpose?
Contingency plans and playbooks
To best protect your assets from damage following an attack and facilitate an orderly response, we develop contingency plans for you – including escalation chains, responsibilities and if necessary, the integration of third party incident responders. We also create playbooks for targeted incident handling, reported through Cybersense Deception and other tools.
Systematic protection based on IT security concepts
However, contingency plans only help to de-escalate. You lay the foundation for systematic protection of your data, systems and employees with an individual security concept that we create together. We proceed as follows: