sb-eu logo
Story image

Illusive Networks joins LogRhythm technology alliance partner program

04 Sep 2019

Deception-based cyber defence solutions provider Illusive Networks has announced an out-of-the-box integration with the LogRhythm NextGen SIEM Platform.

The solution provides real-time, post-breach threat detection while enhancing and automating incident response.

The Illusive Platform identifies attacks early in their life cycle and close to the point of entry, forcing attackers to reveal themselves through engagement with inescapable deceptions that mimic elements of an organisation's real IT environment.

The LogRhythm NextGen SIEM Platform boosts security operations centre (SOC) performance by providing a unified view of all log management, security analytics and threat response activity, leveraging that data to massively automate threat remediation.

The integrated Illusive and LogRhythm solution delivers high-fidelity alerts and on-demand forensics that can be accessed through the LogRhythm NextGen SIEM Platform to further shrink the time and overhead required to find and neutralise threats.

Additionally, the integration provides a customised form of deception technology for LogRhythm customers, in which deceptive NextGen SIEM Platform communication with the Active Directory can trick attackers into stealing fake credentials and alert organisations to an unauthorised user lurking on their networks.

"Dwell time and lateral movement are the gasoline that fuels cyberattacks from the initial beachhead to the crown jewels attackers are targeting," says Illusive Networks founder and CEO Ofer Israeli.

LogRhythm co-founder and chief product and technology officer Chris Peterson says, "Reducing the time to detect intruders is key to stopping threats before critical data is compromised.

"The combined capabilities of Illusive's deception-based alerts and LogRhythm's comprehensive SIEM platform give SOCs earlier threat visibility that is proven to harden security inside the perimeter."

"The integration of the Illusive and LogRhythm platforms provides our customers with noiseless alerts and rich forensics that can be used to automate and amplify event management through LogRhythm playbooks."

"We share an affinity with Illusive for making SOCs more effective at faster alert triage, and we believe the result of this integration will lead to strengthened threat detection, stronger attack analysis, and ultimately fewer successful breaches."

Illusive Networks uses deception technology to stop cyberattacks by detecting and disarming attackers, destroying their decision-making processes, and depriving them of the means to laterally move towards attack targets.

Illusive's inescapable deceptions eliminate high-risk pathways to critical systems, force attackers to reveal themselves early in the threat lifecycle and capture real-time forensics that accelerate incident response.

Built on agentless, AI-driven automation and requiring very little security team support, Illusive immediately shifts the advantage to defenders, freeing precious resources from the complicated and data-heavy approaches that overload them today.

Story image
Insider threat report reveals deception in the workforce
Insider threats come from people inside an enterprise, whether they divulge proprietary information with nefarious intentions, or are just careless employees that unwittingly share sensitive data, writes Bitglass product marketing manager Juan Lugo.More
Story image
Cybersecurity market continues meteoric ascent
With the increase in cyberattacks, organisations are continuing to spend more money on security. However, without a focused cybersecurity strategy, they often spend it in the wrong areas.More
Story image
Creating private data regulations for employees
Whether employees are hired on a part-time or full-time basis, everyone must know about data privacy regulations. Everyone needs to be responsible for keeping the organisation’s data secure. More
Story image
Microsoft is most imitated brand for phishing attacks in Q3
Popular phishing tactics using the Microsoft brand used email campaigns to steal credentials of Microsoft accounts, luring victims to click on malicious links which redirect them to a fraudulent Microsoft login page. More
Story image
Why zero trust could fail due to lack of understanding​, not technology
Security architects are being forced to re-examine the concept of identity, with many turning to a zero trust security model to provide a better architecture for protecting their sensitive resources.More
Story image
Video: 10 Minute IT Jams - protecting data with user behaviour analytics
In this video, Forcepoint senior sales engineer and solutions architect Matthew Bant discusses the company's DLP solution, the importance of integrating compliance into security solutions, and why cybersecurity strategies should take a more people-based approach.More