Skip to main content

Stop the threat of ransomware and APTs

Cybersense Deception detects intrusions into your corporate network early and accurately – preventing data theft, data encryption and extortion attempts.

Active Defense

Often the first or only security system to detect attacks.

Early detection

Exposes attackers during the reconnaissance phase.

Agentless

No additional software on clients or servers.

Non disruptive

Works independently of existing security and IT infrastructure.

Cost control

Can also be used in sub-areas of the corporate network.

Optimal Deception Strategy

Developed with patented AI process.

Cybersense Deception detects reconnaissance and propagation attempts and defeats attacks with AI-optimized Active Defense in your own network

It is widely known how attackers pursue their targets. Accordingly, we can prepare the field with our advanced deception technology: As soon as attackers have breached your IT security systems, they will try to explore your IT (Reconnaissance), propagate (Lateral Movement) and usually also extend their privileges (Privilege Escalation). This means they have to query the DNS and directory services or scan the IP networks. In order to expose them and divert them away from your data and servers, we position Breadcrumbs and Decoys as sensors and traps at the relevant points of your infrastructure: in the network, at the application level and in the Active Directory.

Breadcrumbs – fake keys

Breadcrumbs are perceived keys to success that attackers are looking for with their techniques and tools: Credentials, tokens, certificates, vulnerabilities or misconfigurations. As soon as a key search is underway, the Breadcrumbs make it visible and lead the attacker to the Decoy systems.

Decoys – fake vaults

Decoys are specially created hosts (e.g. virtual servers) that resemble your real assets and are placed between them. As soon as an attacker interacts with a Decoy, Cybersense Deception raises the alert.

Deception Strategy – optimal placement of keys and vaults

We have developed a patented process that uses AI methods such as machine learning to help us determine the optimal Deception Strategy for you.

Always at your side – our team

Cybersense Deception is a highly effective attack detection for on-prem and cloud environments that can be deployed and operated very leanly. Without many alerts – with full data sovereignty. Our experts in the Managed Detection and Response Team provide ongoing support.

We lure attackers on false trails: away from your servers and data

In other words, we create context-specific Decoys that we distribute in your IT infrastructure to lure attackers on a false trail – diverting them away from your real servers and data. The hackers have no chance to distinguish Breadcrumbs and Decoys from the real targets: Our Decoys are fully functional servers that run independently of your productive network. And Cybersense Deception Management scatters the Breadcrumbs onto your network with no discernible pattern. The deployment itself is carried out via your software distribution.

Mini-Glossar
Deception
The result of misleading by a false appearance or trick.
Ransomware
Malware that hijacks data. The attacker encrypts the data and demands a ransom for the decryption key.
APT
An "Advanced Persistent Threat" is a complex, particularly effective attack on critical system assets.
On-Prem
IT infrastructure, which is operated in own data centers.
Cloud bzw. Cloud Computing
Mostly internet-based provision of servers, storage space, computer processing capacities or software as a service.

Alert fatigue? Not with Cybersense Deception

Our intrusion detection system is designed to avoid harmful alert fatigue which results from the otherwise typical masses of alerts that have to be processed daily. Cybersense Deception, on the other hand, only triggers an alert when a Breadcrumb or Decoy is used: via email, SMS and by connecting to existing systems (ticket system, SIEM, monitoring) or security fabrics from well-known manufacturers.

Therefore, you can be sure that the manpower required to operate Cybersense Deception is significantly less than with other intrusion detection approaches.

High workload? We offer Managed Services made to measure

You decide where the rare but meaningful Cybersense Deception alerts are sent: to your administrators, to our team, or both. The designated security experts will then analyze the alerts, follow them up and take all necessary measures to mitigate the threat.

Cybersense Professional Service –
Security concepts made to measure

With Cybersense Deception, we support you in rapidly detecting intrusions in your IT infrastructure. But what happens next?

What measures need to be taken to mitigate the threat? What do these measures involve in detail? How are responsibilities designated within our team? At what point are external resources called in and for what purpose?

Contingency plans and playbooks

To best protect your assets from damage following an attack and facilitate an orderly response, we develop contingency plans for you – including escalation chains, responsibilities and if necessary, the integration of third party incident responders. We also create playbooks for targeted incident handling, reported through Cybersense Deception and other tools.

Systematic protection based on IT security concepts

However, contingency plans only help to de-escalate. You lay the foundation for systematic protection of your data, systems and employees with an individual security concept that we create together. We proceed as follows:

  • 1
    Scope

    We define the sector of your company or organization for which the IT security concept will be created.

  • 2
    Structural analysis

    We compile all information, processes and systems that apply to the concept.

  • 3
    Protection requirements

    Depending on how mission critical assets are structured, we then determine their protection requirements, including those of the interfaces.

  • 4
    Modelling

    We define the necessary security measures.

  • 5
    Security check

    We identify and assess the level of security already in place.

  • 6
    Complementary security analysis

    We identify any risks that still remain.

  • 7
    Security concept

    We suggest organizational and technical measures to reduce any remaining risks to an acceptable level.

Do you have any questions? Would you like a demo?
We look forward to hearing from you.

Your contact partner
Sebastian Struwe

Contact us now