Illusive Networks

Detection and Mitigation of Targeted Cyberattacks

Cyber Security
Acquired by Proofpoint
Acquired Tel Aviv-Yafo Founded 2014
LinkedIn
Total raised
$56.0M
Last: Series B 2020-10
Stage
Acquired
Founded
2014
Headcount
55
HQ
Tel Aviv-Yafo
Sector
Cyber Security

About

Illusive Networks uses deception technology to stop cyberattacks by detecting and disarming attackers, destroying their decision-making processes, and depriving them of the means to move laterally toward attack targets. Illusives deceptions are designed to eliminate high-risk pathways to critical systems, force attackers to reveal themselves early in the threat lifecycle, and capture real-time forensics that accelerate incident response. Illusive stops advanced threats by creating a hostile environment for attackers, depriving them of the means to progress toward critical assets after breaching the perimeter. Hackers are increasingly finding more vulnerabilities within an enterprises security stack, allowing them to move laterally within the network and conduct reconnaissance and exfiltration. Illusive identifies and removes the vulnerable connections and credentials that enable attackers to move undetected and then replaces them with deceptive versions that fool attackers into revealing their presence upon engagement. Unlike behavioral or anomaly-based threat detection, Illusives agentless approach captures deterministic proof of in-progress attacks and provides actionable forensics to empower a quick and effective response.

Funding history · 3 rounds · $56.0M total

2020-10
Series B $24.0M
2016-05
Series B $25.0M
2015-06
Series A $5.0M

Sectors & technology

Primary sector
Cyber Security
Sub-sectors
Cyber SecurityNetwork & Infrastructure Security
Technologies
Platforms & InterfacesSoftware
Target customers
Enterprise & Professional ServicesEnterprises
Business model
B2B

Highlights

1 Patents

Tags

iamaptincident-responsenetwork-securitycyber-securitycyber-intelligenceinsider-threatransomwaremanufacturing-facilitiesforensicsenterprise-securitycloud-securitythreat-detectionvulnerability-managementidentity-verification