Fidelis to unveil active deception technology at GISEC

Active deception defence is emerging as a very powerful post-breach defence

Tags: Cyber crimeFidelis Cybersecurity (www.fidelissecurity.com/)
  • E-Mail
Fidelis to unveil active deception technology at GISEC An active deception defence has recently been identified by Gartner as a top security technology.
By  David Ndichu Published  April 19, 2018

Fidelis Cybersecurity will highlight the latest advancements in its deception technology capabilities, as it exhibits at GISEC 2018, to be held at Dubai World Trade Centre, May 01-03.

New Fidelis Deception Module delivers a deception defence platform that extends visibility and detection deep into the network, learns new attacker techniques and better defends organisations’ critical data assets.

Roland Daccache, senior regional sales engineer, MENA at Fidelis Cybersecurity said, “Regardless of the techniques—behavioural, signature based, machine learning—used by traditional security stack solutions like anti-virus (AV), next-gen firewall (NGFW) and sandbox, attackers and advanced malware are slipping through the cracks.”

“The need for better detection and response is creating new opportunities for security stack automation, integration, consolidation and orchestration, while also driving the emergence of new segments like deception—the use of decoys, traps and lures.  An active deception defence, recently identified by Gartner as a top security technology, is emerging as a very powerful post-breach defence that blends within the customer infrastructure and provides very accurate high-fidelity alerts on any suspicious movement in the network, whether from an insider, or a determined outsider,” he continued.

Fidelis Deception goes a step further and creates evidence of credentials and connections from ‘breadcrumbs’ throughout the network, which are irresistible to attackers. This data, both leads attackers toward the persuasive decoy network while simultaneously creating validated threat intelligence that includes devices, data, and behaviour, all designed to turn the tables on the attackers. They pursue the lures, so security professionals can detect, learn, and defend.

To highlight the value of deception, the Fidelis research team recently conducted a Capture the Flag (CTF) challenge, in which 50 professional hackers and security experts used their knowledge and skills to try to extract a pre-defined piece of data and stay undetected. Among the key findings from the research, 100% of attackers were detected using one or more of the deception mechanisms planted. In terms of mechanisms, 66% of the attackers were lured to and detected by decoys while the rest

Fidelis Cybersecurity can be found at Stand B4 where they will be participating with their channel partner Credence Security.

Add a Comment

Your display name This field is mandatory

Your e-mail address This field is mandatory (Your e-mail address won't be published)

Security code