All resources sponsored by:

Illusive Networks

19 Matches
Managing the Risk of Post-Breach or "Resident" Attacks
sponsored by Illusive Networks
RESEARCH CONTENT:Find out what Ponemon Institute discovered about organizations' readiness for insider threats when they surveyed 627 IT and IT security practitioners in the United States about their understanding of attackers who operate internally.
Posted: 16 Nov 2018 | Published: 16 Nov 2018
Get This Now


Stopping the Attackers You Trust: A Deception-Based Approach to Insider Threats
sponsored by Illusive Networks
RESOURCE:Ponemon Institute found that insider incidents caused by criminal and malicious outsiders were over twice as costly as those caused by negligent insiders. Read this resource to learn about the approach that network security professionals recommend for securing your network.
Posted: 05 Oct 2018 | Published: 05 Oct 2018
Get This Now


Keeping Your Network Safe by Managing The Risk Of Targeted Attacks
sponsored by Illusive Networks
WEBCAST:Cyber attackers often target endpoints and then move laterally through the network. Learn about 2 common types of cyber-attacks and how expert Ivan Foreman recommends eliminating those threats in this webcast.
Posted: 13 Sep 2018 | Premiered: Sep 13, 2018
Get This Now


Deconstructing a Modern Bank Heist: the [not] Carbanak Source Code Leak
sponsored by Illusive Networks
RESOURCE:In August 2018, part of the source code leaked for Buhtrap/Ratopak/Pegasus malware threats – creating a rare opportunity to see how these attacks work and are executed by bad actors. This resource analyzes the leaked source code and takes a look at how it sneaks through network defenses.
Posted: 12 Sep 2018 | Published: 03 Aug 2018
Get This Now


Deception: The Security Strategy That Every IT Team Should Be Using
sponsored by Illusive Networks
RESOURCE:In this resource, find out what Illusive Labs learned about cybercriminals and their use of open source intelligence to infiltrate networks and move laterally through a system.
Posted: 12 Sep 2018 | Published: 12 Sep 2018
Get This Now


Securing Growth Through M&A: Using Deception to Protect Dynamic Business Infrastructure
sponsored by Illusive Networks
RESOURCE:Take a look at this resource about cyber risk use cases for deception technology and learn from the example of how security was compromised when Verizon Communications acquired Yahoo! Inc's Internet properties.
Posted: 22 Aug 2018 | Published: 22 Aug 2018
Get This Now


Deception-Based Cybersecurity for Digital Transformation
sponsored by Illusive Networks
RESEARCH CONTENT:Recently, many businesses have started recognizing the incredible significance of knowing what happens once attackers are already inside your network. Learn how to add a strong post-breach component to your security strategy with advanced attacker deception technology.
Posted: 23 Jul 2018 | Published: 23 Jul 2018
Get This Now


Using Deception to Reduce Cyber Risks for Financial Services
sponsored by Illusive Networks
WHITE PAPER:High priority targets like financial services organizations are constantly under fire by cybercriminals and their increasingly targeted, sophisticated attacks. To combat the threat, learn about Illusive Networks and find out how you can use deception to gain early visibility into attacks across your endpoints.
Posted: 23 Jul 2018 | Published: 31 Dec 2017
Get This Now


Distributed Deception: A Critical Capability to Protect Infrastructure from Targeted Attacks
sponsored by Illusive Networks
RESOURCE:Discover 5 ways distributed deception can help resist and counter Dragonfly and other APT-style targeted attacks on your infrastructure.
Posted: 09 May 2018 | Published: 22 Mar 2018
Get This Now


Attack Surface Manager
sponsored by Illusive Networks
RESOURCE:In this resource, learn about how Attack Surface Manager can help enable network security teams to efficiently and continuously minimize the proliferation of credentials to make the network as a resistant as possible to attacks.
Posted: 08 May 2018 | Published: 08 May 2018
Get This Now


A Deception Approach to Protecting ATM Networks
sponsored by Illusive Networks
WHITE PAPER:Access this white paper to gain a better understanding of network-based attacks on ATMs and how distributed deception technology can help protect ATM machines.
Posted: 08 May 2018 | Published: 08 May 2018
Get This Now


3 Use Cases for Deception Technology in Healthcare
sponsored by Illusive Networks
WHITE PAPER:In the healthcare industry, security teams struggle to keep pace with the escalation of cyber risk. In this white paper, learn 3 use cases of deception technology in healthcare to protect both the mission and the bottom line by stopping attacks before they can do significant damage.
Posted: 22 Feb 2018 | Published: 26 Feb 2018
Get This Now


Deception Matters: Slowing Down the Adversary
sponsored by Illusive Networks
WEBCAST:In this webcast, learn about deception technology, a cybersecurity tactic which creates an illusion of reality that the adversary cannot differentiate, ultimately protecting your network and sensitive data.
Posted: 21 Feb 2018 | Premiered: Feb 21, 2018
Get This Now


Case Study: Growing Regional Bank Preempts Potential Cyber Attackers
sponsored by Illusive Networks
CASE STUDY:How do you get out in front of growing cyber risk without falling behind on your customer experience needs? This case study details Illusive Network's Deception Management System, a response tool which can help improve your organization's ability to identify and investigate a potentially malicious activity.
Posted: 13 Feb 2018 | Published: 13 Feb 2018
Get This Now


Deception Matters: Slowing Down the Adversary
sponsored by Illusive Networks
WHITE PAPER:Access this SANS review to learn about the key benefits of deception technology and how to successfully deploy it in your network security strategy.
Posted: 12 Feb 2018 | Published: 31 May 2017
Get This Now


Stop Targeted Attacks Before they Stop your Business
sponsored by Illusive Networks
RESOURCE:Access this resource to learn about Illusive's Deception Management System, a security tool where deceptions are perpetually designed, turned and tailored using AI so they appear—and remain—authentic to attackers.
Posted: 08 Feb 2018 | Published: 08 Feb 2018
Get This Now


3 Use Cases for Deception Technology in Financial Services
sponsored by Illusive Networks
WHITE PAPER:This white paper details how a deception solution can help lay the foundation for an active defense program. In addition, uncover 3 use cases for deception technology in financial services, as the industry plays an important role in shaping network and security best practices regarding cybersecurity.
Posted: 07 Feb 2018 | Published: 07 Feb 2018
Get This Now


Wire Transfer Guard: Harnessing Distribution Deception to Prevent Cyber Fraud
sponsored by Illusive Networks
CASE STUDY:This resource highlights how early network visibility and insight allows defenders to secure the time they need to analyze the adversary and take appropriate action when protecting financial transfers.
Posted: 12 Feb 2018 | Published: 12 Feb 2018
Get This Now


Deception Technology Comes of Age
sponsored by Illusive Networks
WHITE PAPER:Today, deception technology is gaining more and more attention as an innovative cybersecurity technology that can shift the balance of power back to your business. This white paper details how to embrace deception as a network security tool with 5 compelling reasons.
Posted: 09 Feb 2018 | Published: 09 Feb 2018
Get This Now


19 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement