Overview
What is Illusive Shadow?
Illusive Networks, headquartered in Tel Aviv, offers the Illusive Shadow, an agentless, undetectable deception technology that creates a hostile environment for attackers, stopping lateral movement and access to critical assets.
Recent Reviews
Leaving a review helps other professionals like you evaluate Deception Technology Software
Be the first one in your network to review Illusive Shadow, and make your voice heard!
Get StartedPricing
Entry-level set up fee?
- No setup fee
Offerings
- Free Trial
- Free/Freemium Version
- Premium Consulting/Integration Services
Would you like us to let the vendor know that you want pricing?
5 people also want pricing
Alternatives Pricing
Product Details
- About
- Tech Details
What is Illusive Shadow?
Where attackers are inside network, undetected by solutions focused on the perimeter or behavioral anomalies, Illusive Shadow™ plants deceptions on every endpoint--ones that look like the data attackers need to move laterally towards critical assets. Then with instant post-perimeter detection, Illusive Shadow alerts the user to the presence of an attacker.
Illusive Shadow Features & Benefits
Illusive Shadow Features & Benefits
75+ Deception Techniques
Utilize active deception techniques to imitate credentials, connections, data, systems, and other artifacts that appear useful to the attacker. Ensure early attacker detection— both insiders and external attackers—no matter where compromise begins.
Agentless Detection and Protection
Illusive’s unique agentless approach is built on intelligent automation, it is designed to have a light operational footprint to minimize the impact on IT and can’t be disabled or circumvented by attackers like other agent-based solutions.
A View from the Attacker’s Perspective
A View from the Attacker’s Perspective
The Illusive Shadow™ management console shows how close attackers are to critical assets, a full timeline of attacker activity once deceptions are engaged, full visibility into how attackers perceive the deceptive data, and much more intelligence on attacker activity.
Automated Deception Customized to Each Endpoint
An intelligent automation system enables an authentic deception environment that scales and adapts over time with very little human effort. Illusive Shadow™ analyzes the endpoint landscape, designs tailored deceptions for each machine, deploys them through a one-click process, and manages the ongoing process of adjusting and managing deceptions over time.
Trap Server to Detour Ransomware and Other Threats
The Illusive Trap Server invisibly interacts with attackers, moving them away from real data and critical assets and towards a completely imaginary attack surface.
Deceptive Microsoft Office Beacon Files
Organizations can automate the creation and customization of hundreds of thousands of deceptive Word and Excel documents that are indistinguishable from the genuine article, right down to the usage of company logos and letterhead. These fake but seemingly real Office documents can be loaded with fake data that sets off an alert as soon as an attacker tries to use the information to gain access.
FirstMove Services
Illusive provides services to fill staffing gaps as needed, from assistance planning deployments to development of special use cases and interpretation of alerts.
Illusive Shadow Video
Illusive Networks. Make the First Move.
Illusive Shadow Technical Details
Operating Systems | Unspecified |
---|---|
Mobile Application | No |