Illusive customers run the gamut of industries and security priorities.
Discover how various organizations are using Illusive and what we've helped them detect in their network.
This Manufacturer Throws Cold Water on Cyberattack Attempts
Illusive detects presence of threats and attempts at lateral movement that other defenses missed. "No CISO can afford to be without Illusive's deception platform in their environment today." —Cybersecurity Officer
National Bank Preempts Potential Attackers
“Illusive closes the gap between a targeted attack and awareness of an attacker’s presence. It allows us to proactively protect our customers, business, and assets. And it makes my job a lot easier.” —IT Manager
Professional Sports Team
Championship Team's Front-Line Defense Stops Cyber Threats' Offense
“The team's owner considers cyber security to be a top initiative, and deception technology is a game-changer. We encourage any team and the national league to use Illusive Networks.” —Director of Information Technology
Retail & Distribution Company
Grows Business While Shrinking Cybersecurity Posture
“Illusive is the foundation of our incident response plan and has rapidly elevated our security level. Every part of our network is covered by a maze of deception, and I can zero in on an attacker within two lateral movements more than 98 percent of the time. Illusive gives us a lot of confidence that we’re protecting the business.” —Security Manager
Credential Visibility Sheds Light on Software Flaw
The customer acknowledged that despite having PAM and many other technologies in the SOC, they could not have discovered this critical credentials vulnerability without Illusive.
Electrical Hardware Supplier
Speeding Up Incident Response
The CISO notes that having centralized, searchable forensics at their fingertips significantly improves their effectiveness and enables them to audit and measure their productivity. “For years I’ve been searching for a product that presents forensics in a way that is tuned in to how analysts actually think and make decisions,” he said.
US Federal Agency
Blue Team Beats Red Team Armed with LAN Turtle
Illusive was able to detect when deceptive credentials were accessed via LAN Turtle devices that were physically connected to a machine. LAN Turtles—easily available for purchase—are especially dangerous devices because they give attackers the ability to extract credentials from a machine even though it is locked.
Thwarting a Dictionary Attack
Using Illusive’s Attack Detection System, a U.S. energy firm discovered a user was evidently trying to link a password to a deceptive username that Illusive had deployed. A further review revealed a full dictionary attack. The attacker used a script that tried logging in with generic usernames passwords spread out across the network, so as to not trip any alarms – but failed to evade Illusive’s early detection capabilities.
How to Frustrate a Red Team
“I want Illusive on every system we have by year end.” ─CISO of a US-based media company, after Illusive successfully blocked every attempt in a penetration test, which was being conducted to test the security of a newly acquired subsidiary.
Global Law Firm
The Power of Credential Visibility
As soon as it went live, Attack Surface Manager discovered thousands of hidden credentials, including many instances of domain admin credentials where they didn’t belong—and which the security consultants had not seen. The director, wowed by the visibility Illusive could provide and knowing the importance of ongoing credential hygiene in preventing cyberattacks, moved Illusive from the chopping block to his “must-have” list.
See It, Believe It
"An employee tried to access an Illusive deceptive file share, which was designed to look like customer files. The real-time forensic screenshot captured from the user’s machine showed that he had been enumerating available shares, mapping network drives, and copying shared data to his hard drive."
Large Telecom Company
Early Detection Enables Cool Response
The IT team learned to trust and rely on Illusive to detect lateral movement early and to use Illusive forensic snapshots for documenting each step in an attack. With a complete story, supported by timestamps and detailed tactical data, they will be able to gain the proof needed to pursue an investigation and successfully resolve future incidents.