Skip to main content
TrustRadius
Illusive Shadow

Illusive Shadow

Overview

What is Illusive Shadow?

Illusive Networks, headquartered in Tel Aviv, offers the Illusive Shadow, an agentless, undetectable deception technology that creates a hostile environment for attackers, stopping lateral movement and access to critical assets.

Read more
Recent Reviews
TrustRadius

Leaving a review helps other professionals like you evaluate Deception Technology Software

Be the first one in your network to review Illusive Shadow, and make your voice heard!

Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is Illusive Shadow?

Illusive Networks, headquartered in Tel Aviv, offers the Illusive Shadow, an agentless, undetectable deception technology that creates a hostile environment for attackers, stopping lateral movement and access to critical assets.

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

5 people also want pricing

Alternatives Pricing

What is InsightIDR?

In addition to their incident response service, Rapid7 offers InsightIDR, a combined XDR and SIEM that provides user behavior and threat analytics.

What is CyberTrap?

CyberTrap, headquartered in Vienna, offers their eponymous security software solution, a deception-as-a-service, that provides protection for enterprises against targeted attacks and cyber crime.

Return to navigation

Product Details

What is Illusive Shadow?

Where attackers are inside network, undetected by solutions focused on the perimeter or behavioral anomalies, Illusive Shadow™ plants deceptions on every endpoint--ones that look like the data attackers need to move laterally towards critical assets. Then with instant post-perimeter detection, Illusive Shadow alerts the user to the presence of an attacker.



Illusive Shadow Features & Benefits

75+ Deception Techniques
Utilize active deception techniques to imitate credentials, connections, data, systems, and other artifacts that appear useful to the attacker. Ensure early attacker detection— both insiders and external attackers—no matter where compromise begins.

Agentless Detection and Protection
Illusive’s unique agentless approach is built on intelligent automation, it is designed to have a light operational footprint to minimize the impact on IT and can’t be disabled or circumvented by attackers like other agent-based solutions.

A View from the Attacker’s Perspective
The Illusive Shadow™ management console shows how close attackers are to critical assets, a full timeline of attacker activity once deceptions are engaged, full visibility into how attackers perceive the deceptive data, and much more intelligence on attacker activity.

Automated Deception Customized to Each Endpoint
An intelligent automation system enables an authentic deception environment that scales and adapts over time with very little human effort. Illusive Shadow™ analyzes the endpoint landscape, designs tailored deceptions for each machine, deploys them through a one-click process, and manages the ongoing process of adjusting and managing deceptions over time.

Trap Server to Detour Ransomware and Other Threats
The Illusive Trap Server invisibly interacts with attackers, moving them away from real data and critical assets and towards a completely imaginary attack surface.

Deceptive Microsoft Office Beacon Files
Organizations can automate the creation and customization of hundreds of thousands of deceptive Word and Excel documents that are indistinguishable from the genuine article, right down to the usage of company logos and letterhead. These fake but seemingly real Office documents can be loaded with fake data that sets off an alert as soon as an attacker tries to use the information to gain access.

FirstMove Services
Illusive provides services to fill staffing gaps as needed, from assistance planning deployments to development of special use cases and interpretation of alerts.

Illusive Shadow Video

Illusive Networks. Make the First Move.

Illusive Shadow Technical Details

Operating SystemsUnspecified
Mobile ApplicationNo
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews

Sorry, no reviews are available for this product yet

Return to navigation