Page 10 - Reduce security blind spots and paralyze ransomware
P. 10
Attack Intelligence System
Gain actionable, forensic insights for faster cyber
incident response.
With ASM cleaning the Azure AD is occurring contained in typical
environment, ransomware attackers security tool alerts, and it helps speed
have little choice but to engage with investigation and incident response
the deceptions Illusive places in their times. Responders now have the ability
path. Once ransomware attackers engage to prioritize incidents based on potential
with Illusive deceptions, Illusive Attack impact and capture the detail-rich
Intelligence System springs into action, forensic data needed to shape the full
collecting real-time source forensics cyber incident investigation, and they
from the endpoint where attackers are can also collect these forensics on
operating. This deterministic approach demand for alerts triggered by Microsoft
is based on attacker behavior, rather solutions, such as Azure Sentinel and
than the probability that risky behavior Microsoft Defender for Endpoint.
With Illusive Attack
Intelligence System:
• Endpoint forensics are instantly captured
from compromised hosts when a deception is
tripped, including screenshots and volatile and
nonvolatile system data.
• The Forensics Timeline presents a roll-up of all
incident data in an easy-to-use, time-stamped,
and sortable format.
• The Attacker View Management Console shows
the proximity of the ransomware attackers to
the organization’s critical business systems.