NEW YORK and TEL AVIV, Israel, March 24, 2020 /PRNewswire/ — Illusive Networks®, the leader in deception-based cyber defense solutions, today announced an out-of-box integration with BlueCat Adaptive DNS. This integration helps speed deployment of dynamically authentic deceptive Active Directory (AD) artifacts for detection of in-network attacks.
Malicious actors who have gotten in the network need and expect to find the residue of errant credentials and connections left behind from daily business operations in order to advance their east-west traverse of the network. Illusive Networks covers the network with a net of deceptions that authentically mimic real-world network and data assets in order to detect and stop bad actors’ advance. As attackers attempt network exploration, they are unknowingly forced to navigate a path filled with unavoidable deceptions. With no ability to discern fake from real, a single interaction with a deception reveals the attacker’s presence. This instantly triggers notifications rich with critical source forensics.
Authenticity of deceptions requires a mix of real network data and the ability to automatically refresh environments on a continuous basis. Both steps keep the false environment dynamic and credible. Illusive Networks’ integration with BlueCat Adaptive DNS automates the IP address provisioning process vital to the creation of these environments. It replaces manual processes with the speed and efficiency of deceptive Active Directory assets deployed through automation. For more information about the combined solution, read the integration brief or check out the BlueCat blog.
For organizations deploying in stealth, BlueCat’s automatic provisioning of IP addresses obscures their intended assignment for deceptive use and regulates the pool the addresses come from, thus limiting scope of knowledge for the resource to essential personnel only.
Gil Shulman, vice president of product management, Illusive Networks, said:
“Landing on a domain admin account is an attacker’s jackpot, allowing malicious actions that most tools will see as normal user activity. The ability to poison the environment with authentic and credible Active Directory deceptions is essential for luring attackers from the shadows so they can be detected and contained. The ability for our customers to easily bind our two platforms for improved operational efficiency, reduced network conflict and ultimately, for improved defense from in-network attacks, helps flip the dynamic in favor of the defenders.”
Gautam Nadella, vice president of business development, BlueCat, said:
“Native integration between Illusive Networks’ distributed deception platform and BlueCat Adaptive DNS helps our customers enhance operational efficiency and scalability, while minimizing deployment impact to network team resources. From a DNS management perspective, this approach reduces the chance of DNS misconfigurations that create attack risk and ensures security of DNS operations. We look forward to helping our customers optimize this new capability.”
About BlueCat
BlueCat is the Adaptive DNS company. The company’s mission is to help the world’s largest organizations thrive on network complexity, from the edge to the core. To do this, BlueCat re-imagined DNS. The result – Adaptive DNS – is a dynamic, open, secure, scalable, and automated resource that supports the most challenging digital transformation initiatives, like adoption of hybrid cloud and rapid application development. Learn more at www.bluecatnetworks.com.
About Illusive Networks
Illusive Networks uses next-generation deception technology to stop cyber-attacks by paralyzing attackers, destroying their ability to make decisions, and depriving them of the means to move sideways towards attack targets. Illusive’s inescapable deception and attack surface reduction capabilities eliminate high-risk pathways to critical systems, force attackers to reveal themselves early in the threat lifecycle, and capture real-time forensics that accelerate incident response. Built on agentless, advanced automation, and requiring very little security team support, Illusive immediately shifts the advantage to defenders, freeing precious resources from the complicated and data-heavy approaches that overloaded them in the past.
For more information, visit www.illusivenetworks.com, contact us at info@illusivenetworks.com or follow on LinkedIn, @Illusivenw on Twitter and Facebook.
Media Contact for Illusive:
Corey Eldridge
Nadel Phelan, Inc.
831-440-2414
corey.eldridge@nadelphelan.com
SOURCE Illusive Networks