CUSTOMER CASE STUDY
Illusive Identifies Cyber Attackers Quickly and Delivers Forensics in Minutes
The largest cybersecurity breach of U.S. national security in history–the supply chain compromise of Solarwinds–went undetected by government security tools. Yet the tactics and techniques used by the adversaries are known and have been documented in the MITRE ATT&CK framework for years. So what went wrong?
This paper proposes a different approach to adversary detection by detecting the constants in a breach using the concept of active defense as described by the new MITRE Shield framework.
Illusive is the foundation of our incident response plan and has rapidly elevated our security level. Every part of our network is covered by a maze of deception, and I can zero in on an attacker within two lateral movements more than 98 percent of the time. Illusive gives us a lot of confidence that we’re protecting the business.
—Security Manager
As the company grows through acquisition and expands online commerce, it wanted to simultaneously reduce cyber security risk with:
© Illusive 2022