By Michael Yehoshua, Director of Marketing
Let’s face it, we fight cybercrime on a daily basis, but attackers – they’re not backing down.
In 2018 alone, we have seen a 350% increase in ransomware attacks, a 250% increase in spoofing or business email compromise (BEC) attacks and a 70% increase in spear-phishing attacks in companies overall. Additionally, the average cost of a cyber-data breach has risen from $4.9 million in 2017 to $7.5 million in 2018, according to the U.S. Securities and Exchange Commission.
We at TrapX Security take great pride as being the pioneers of Cyber-Deception technology. Over the years, we’ve evolved the concept of honeypots into a complex, dynamic, multi-tiered cyber security solution that is currently deployed in hundreds of the world’s largest enterprises. Our users have full coverage of their crown jewels, endpoints, networks, IoT devices and any other device native to their network – can be emulated and turned it into traps.
As a company that’s rooted in innovation and thought leadership, we have added even more capabilities to our already powerful, award winning solution.
With our release of DeceptionGrid 6.3, we’ve launched an army of artificial users to expose cyber attackers, we also added the ability to track the locations of attackers and added more capabilities to our groundbreaking Build Your Own Trap feature. Let’s break them down for you.
The Artificial Army
New-generation Traps (decoys) are now able to behave like exploited users and mimic user activities based.
When attackers try to attack a user, they will get the feeling that they’re exploiting the user when in reality – they’re being monitored and led astray in a trap. This exposes attackers and their tactics in a safe environment – all while keeping an organization’s network completely safe.
The Hacker Tracker
Defenders now have the ability to track hackers back to their command and control locations. It is done by tracking deceptive files accessed from outside the network. Deceptive files are in essence lures (bait files) that are intended for hackers to access. It is important to know as much as possible about attackers not to mention rogue insiders that allow themselves to take sensitive company data home.
Build Your Own Trap – Enhancements
Build Your own Trap is a unique feature that enables users to create any tailor-made attack surfaces to be identical to the user’s native environment. A new point and click feature allows users to create additional fake instances of sensitive web applications. Your website and web apps can now become emulated traps – they can look, feel and behave just like your website but if anyone tries to do anything that isn’t “kosher”, you’ll be notified instantly and see exactly what the attackers are trying to do while no one seems to be watching. In addition, a broader range of IoT devices are now available to be emulated giving users flexibility and creative freedom to thwart attacker’s plans on an even-grater scale.
Improved Protection for Rockwell / SIEMENS SCADA Controllers
In order to further improve our product for our OT security users, we’ve forged close partnerships with the world’s leading manufacturing companies in order to create new generations of cyber traps that can perfectly mimic operational technology devices such as Rockwell and Siemens industrials controllers With the new GUI enhancements for Rockwell and Siemens, attackers are not able to tell if they’re in a trap or if they’re in a real system since the design and functionality of these controllers are identical.
Welcome to the brave new world of deception based cyber-security – with DeceptionGrid 6.3
Learn About What Customers Have to Say About Using DeceptionGrid
Last week, Procter & Gamble, one of the largest manufacturers in the world, joined us for a webinar sharing their use cases and stories of how DeceptionGrid provided them with high fidelity (accurate) alerts and with almost no false positives.
Check it out