TrapX Security Wins 2016 Golden Bridge Awards Best Deception-Based Security Product

SAN MATEO, Calif.—August 2, 2016 — TrapX™, a global leader in advanced cybersecurity defense, today announced the company has won the Gold award for Best Deception-Based Security Product for this year’s Golden Bridge Awards. The company’s DeceptionGrid™ provides automated, highly accurate insight into attackers’ lateral movements and malicious activity with real-time detection and defense against zero-day malware and other advanced threats. DeceptionGrid creates a network of traps (decoys) that are intermingled with and imitate a company’s real information technology assets, creating an environment that attracts and detects malicious insiders as soon as they begin their attacks.

Earlier this month, TrapX announced its DeceptionGrid platform has evolved beyond IT to include emulations for Point-of-Sale (PoS) systems and medical devices as well as the industry’s first Mac OS emulation.

The Golden Bridge Business Awards were created to honor and generate industry-wide recognition of the achievements and positive contributions of organizations and businesses worldwide in every area. Winners will be honored in San Francisco on Monday, September 12, 2016, during the annual Red Carpet Golden Bridge Awards Ceremony.

“TrapX is proud to be recognized as the best deception product in the industry. This award reaffirms the value of our pioneering technology and furthers our leadership in advanced cybersecurity defense with an award-winning platform that significantly reduces the time to breach detection,” said Greg Enriquez, CEO of TrapX Security. “One of the greatest security industry challenges is ensuring that organizations’ data is protected while also proactively giving them the ability to identify and defend against unforeseen and evolving threats. DeceptionGrid brings new techniques and best practices to organizations’ security arsenals, allowing them to detect, deceive and rapidly defeat sophisticated attackers and malicious insiders before valuable data can be compromised or stolen.”