Illusive Customer Experience Snapshots

Discover how our customers are winning with Illusive

Illusive customers run the gamut of industries and security priorities.

Discover how various organizations are using Illusive and what we've helped them detect in their network.


manufacturing customer experience snapshot

Manufacturing Company

This Manufacturer Throws Cold Water on Cyberattack Attempts

Illusive detects presence of threats and attempts at lateral movement that other defenses missed.  "No CISO can afford to be without Illusive's deception platform in their environment today." —Cybersecurity Officer

View the full story

 _________

bank icon file

National Bank

National Bank Preempts Potential Attackers

“Illusive closes the gap between a targeted attack and awareness of an attacker’s presence. It allows us to proactively protect our customers, business, and assets. And it makes my job a lot easier.” —IT Manager

View the full story

 _________

professional sports team icon

Professional Sports Team

Championship Team's Front-Line Defense Stops Cyber Threats' Offense

“The team's owner considers cyber security to be a top initiative, and deception technology is a game-changer. We encourage any team and the national league to use Illusive Networks.” —Director of Information Technology

View the full story

 _________

 

healthcare provider customer experience snapshot

Retail & Distribution Company

Grows Business While Shrinking Cybersecurity Posture

“Illusive is the foundation of our incident response plan and has rapidly elevated our security level. Every part of our network is covered by a maze of deception, and I can zero in on an attacker within two lateral movements more than 98 percent of the time. Illusive gives us a lot of confidence that we’re protecting the business.” —Security Manager

View the full story

 _________

healthcare provider customer experience snapshot

Healthcare Provider

Credential Visibility Sheds Light on Software Flaw

The customer acknowledged that despite having PAM and many other technologies in the SOC, they could not have discovered this critical credentials vulnerability without Illusive.

View the full story _________

 

Electrical Hardware Customer Experience Snapshot

Electrical Hardware Supplier

Speeding Up Incident Response

The CISO notes that having centralized, searchable forensics at their fingertips significantly improves their effectiveness and enables them to audit and measure their productivity. “For years I’ve been searching for a product that presents forensics in a way that is tuned in to how analysts actually think and make decisions,” he said.

View the full story

_________

 

US federal agency customer experience snapshot

US Federal Agency

Blue Team Beats Red Team Armed with LAN Turtle

Illusive was able to detect when deceptive credentials were accessed via LAN Turtle devices that were physically connected to a machine. LAN Turtleseasily available for purchaseare especially dangerous devices because they give attackers the ability to extract credentials from a machine even though it is locked. 

View the full story

_________

 

Energy Firm Customer experience snapshot

Energy Firm

Thwarting a Dictionary Attack

Using Illusive’s Attack Detection System, a U.S. energy firm discovered a user was evidently trying to link a password to a deceptive username that Illusive had deployed. A further review revealed a full dictionary attack. The attacker used a script that tried logging in with generic usernames passwords spread out across the network, so as to not trip any alarms – but failed to evade Illusive’s early detection capabilities.View the full story

_________

 

media merger customer experience snapshot

Media Merger

How to Frustrate a Red Team

“I want Illusive on every system we have by year end.” ─CISO of a US-based media company, after Illusive successfully blocked every attempt in a penetration test, which was being conducted to test the security of a newly acquired subsidiary.

View the full story

_________

 

law firm customer experience snapshot

Global Law Firm

The Power of Credential Visibility

As soon as it went live, Attack Surface Manager discovered thousands of hidden credentials, including many instances of domain admin credentials where they didn’t belong—and which the security consultants had not seen. The director, wowed by the visibility Illusive could provide and knowing the importance of ongoing credential hygiene in preventing cyberattacks, moved Illusive from the chopping block to his “must-have” list.

View the full story

_________

 

manufacturing customer experience snapshot

Manufacturing Company

See It, Believe It

"An employee tried to access an Illusive deceptive file share, which was designed to look like customer files. The real-time forensic screenshot captured from the user’s machine showed that he had been enumerating available shares, mapping network drives, and copying shared data to his hard drive." 

View the full story

_________

 

media merger customer experience snapshot

Large Telecom Company

Early Detection Enables Cool Response

The IT team learned to trust and rely on Illusive to detect lateral movement early and to use Illusive forensic snapshots for documenting each step in an attack. With a complete story, supported by timestamps and detailed tactical data, they will be able to gain the proof needed to pursue an investigation and successfully resolve future incidents.

View the full story

_________