SAN MATEO, Calif. – February 13, 2017 – TrapX Security®, a global leader in deception-based advanced cyber security defense, today announced that it has released version 6.0 of its DeceptionGrid™ platform. Version 6.0 offers the new industry-leading Deception-in-Depth architecture, significantly deepening deception capabilities designed to bait, engage and trap attackers throughout all stages of a breach. The DeceptionGrid expansion adds a new layer of deception to the existing multi-layered deception approach. Now with the ability to deploy a high-interaction trap based on a full OS, customers can clone existing assets to get deeper intel on the intruder. This deep interaction layer provides the ability to better visualize attacks, while more effectively deceiving attackers, by tailoring deception layers to best match the attack vectors.
As a part of DeceptionGrid 6.0’s Deception in Depth architecture, the full OS enables organizations to completely replicate an entire production server that can clone customer assets in any part of the network. The full OS provides enhanced forensics capabilities that allow users to understand the attack in more detail. With this knowledge, security teams can quickly identify the assets being targeted from an attackers’ point of view, find the location of the attackers and determine what they are attempting to accomplish.
Also as part of the enhanced platform, DeceptionGrid 6.0 features new built-in intelligence capabilities that allow the user to automatically determine if the attack originates from a human perpetrator or from malware moving through the network. This elevated intelligence helps security teams better analyze the threat by providing detailed answers to critical questions about whether an attacker has penetrated a network, what its intentions are once it is inside and how quickly an attack can be stopped.
“It’s no secret that cyber criminals are becoming more sophisticated and more detail-oriented in their attack methods. Consequently, security solutions have to stay ahead of the attackers, not only anticipating their next move but also their next series of moves,” said Greg Enriquez, CEO of TrapX Security. “In light of this evolving threat landscape, DeceptionGrid 6.0 raises the bar on the industry yet again by delivering new deception capabilities that are unsurpassed in the market. Customers can thus keep potential attackers immersed, distracted and held captive even longer, preventing them from looking for other enterprise assets while security teams remediate the threat. DeceptionGrid 6.0 also exposes attackers’ tactics, giving organizations the ability to catch on to their techniques, gather detailed forensics and effectively combat them with the right tools, so they can quickly return to normal operations.”
DeceptionGrid 6.0 newest features include:
● High-Interaction (Full Operating System) Traps: DeceptionGrid now supports the ability for customers to clone existing assets with our new tier of high-interaction (full OS) Traps. These traps work in concert with the existing medium-interaction traps and can completely replicate actual production servers to further deceive and more deeply engage attackers.
● Active Traps: New active-traps functionality creates a stream of false network traffic among deployed traps to confuse and divert attackers that monitor the traffic, ensuring they engage with the deployed traps.
● Powerful Attack Visualization: New expanded visualization enables the security operations team to rapidly understand the activities of the attacker over time, from the originating intrusion to the assets they are engaging with, to the final containment.
● Attack identification: New attack identification automatically determines if an attack is being conducted by a human attacker or automated attack tools, giving security teams a better understanding of the attack and subsequent containment methods.
● Built-in industry templates: The patented medium-interaction traps now include expanded templates for specialized devices based on industries. These templates include ATMs and SWIFT assets for financial services, Point of Sale (PoS) devices for retailers, devices for medical and manufacturing use, and many more, thus allowing customers in diverse industries to determine if attackers are targeting specialized devices that are often vulnerable to attack.