All resources sponsored by:

Illusive Networks

11 Matches
Distributed Deception: A Critical Capability to Protect Infrastructure from Targeted Attacks
sponsored by Illusive Networks
RESOURCE:Discover 5 ways distributed deception can help resist and counter Dragonfly and other APT-style targeted attacks on your infrastructure.
Posted: 09 May 2018 | Published: 22 Mar 2018
Get This Now


Attack Surface Manager
sponsored by Illusive Networks
RESOURCE:In this resource, learn about how Attack Surface Manager can help enable network security teams to efficiently and continuously minimize the proliferation of credentials to make the network as a resistant as possible to attacks.
Posted: 08 May 2018 | Published: 08 May 2018
Get This Now


A Deception Approach to Protecting ATM Networks
sponsored by Illusive Networks
WHITE PAPER:Access this white paper to gain a better understanding of network-based attacks on ATMs and how distributed deception technology can help protect ATM machines.
Posted: 08 May 2018 | Published: 08 May 2018
Get This Now


3 Use Cases for Deception Technology in Healthcare
sponsored by Illusive Networks
WHITE PAPER:In the healthcare industry, security teams struggle to keep pace with the escalation of cyber risk. In this white paper, learn 3 use cases of deception technology in healthcare to protect both the mission and the bottom line by stopping attacks before they can do significant damage.
Posted: 22 Feb 2018 | Published: 26 Feb 2018
Get This Now


Deception Matters: Slowing Down the Adversary
sponsored by Illusive Networks
WEBCAST:In this webcast, learn about deception technology, a cybersecurity tactic which creates an illusion of reality that the adversary cannot differentiate, ultimately protecting your network and sensitive data.
Posted: 21 Feb 2018 | Premiered: Feb 21, 2018
Get This Now


Case Study: Growing Regional Bank Preempts Potential Cyber Attackers
sponsored by Illusive Networks
CASE STUDY:How do you get out in front of growing cyber risk without falling behind on your customer experience needs? This case study details Illusive Network's Deception Management System, a response tool which can help improve your organization's ability to identify and investigate a potentially malicious activity.
Posted: 13 Feb 2018 | Published: 13 Feb 2018
Get This Now


Wire Transfer Guard: Harnessing Distribution Deception to Prevent Cyber Fraud
sponsored by Illusive Networks
CASE STUDY:This resource highlights how early network visibility and insight allows defenders to secure the time they need to analyze the adversary and take appropriate action when protecting financial transfers.
Posted: 12 Feb 2018 | Published: 12 Feb 2018
Get This Now


Deception Matters: Slowing Down the Adversary
sponsored by Illusive Networks
WHITE PAPER:Access this SANS review to learn about the key benefits of deception technology and how to successfully deploy it in your network security strategy.
Posted: 12 Feb 2018 | Published: 31 May 2017
Get This Now


Deception Technology Comes of Age
sponsored by Illusive Networks
WHITE PAPER:Today, deception technology is gaining more and more attention as an innovative cybersecurity technology that can shift the balance of power back to your business. This white paper details how to embrace deception as a network security tool with 5 compelling reasons.
Posted: 09 Feb 2018 | Published: 09 Feb 2018
Get This Now


Stop Targeted Attacks Before they Stop your Business
sponsored by Illusive Networks
RESOURCE:Access this resource to learn about Illusive's Deception Management System, a security tool where deceptions are perpetually designed, turned and tailored using AI so they appear—and remain—authentic to attackers.
Posted: 08 Feb 2018 | Published: 08 Feb 2018
Get This Now


3 Use Cases for Deception Technology in Financial Services
sponsored by Illusive Networks
WHITE PAPER:This white paper details how a deception solution can help lay the foundation for an active defense program. In addition, uncover 3 use cases for deception technology in financial services, as the industry plays an important role in shaping network and security best practices regarding cybersecurity.
Posted: 07 Feb 2018 | Published: 07 Feb 2018
Get This Now


11 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement