Page 10 - Reduce security blind spots and paralyze ransomware
P. 10

Attack Intelligence System





        Gain actionable, forensic insights for faster cyber

        incident response.



        With ASM cleaning the Azure AD                          is occurring contained in typical
        environment, ransomware attackers                       security tool alerts, and it helps speed

        have little choice but to engage with                   investigation and incident response

        the deceptions Illusive places in their                 times. Responders now have the ability

        path. Once ransomware attackers engage  to prioritize incidents based on potential
        with Illusive deceptions, Illusive Attack               impact and capture the detail-rich

        Intelligence System springs into action,                forensic data needed to shape the full

        collecting real-time source forensics                   cyber incident investigation, and they

        from the endpoint where attackers are                   can also collect these forensics on
        operating. This deterministic approach                  demand for alerts triggered by Microsoft

        is based on attacker behavior, rather                   solutions, such as Azure Sentinel and

        than the probability that risky behavior                Microsoft Defender for Endpoint.













                        With Illusive Attack

                        Intelligence System:



                     •  Endpoint forensics are instantly captured
                        from compromised hosts when a deception is
                        tripped, including screenshots and volatile and
                        nonvolatile system data.

                     •  The Forensics Timeline presents a roll-up of all
                        incident data in an easy-to-use, time-stamped,
                        and sortable format.


                     •  The Attacker View Management Console shows
                        the proximity of the ransomware attackers to
                        the organization’s critical business systems.
   5   6   7   8   9   10   11   12   13   14