Protect against unknown & sophisticated threats
Prevent damage to data & assets
Reduce reputational risk
Reduce operational burden
CISOs / IT Managers
Automate responses on
Reduce alerts & false positives
Protect remote employees
Adapt to changes in IT environments
costs & resources
Deceptive Bytes provides an innovative solution against threats in enterprises’ most critical and exposed assets, their endpoints!
The solution creates dynamic & deceptive information which interferes with any attempt to recon the environment and deters the attacker from executing its malicious intents, through all the stages of compromise in the Attack Kill Chain – covering advanced & sophisticated malware techniques, constantly making sure all the endpoints & data in the enterprise are secured.
Making malware believe it’s in an unattractive/hostile environment to attack and reducing the chances of a successful attack.
For example, creating a sandbox/VM environment which deter malware.
Actively responding to threats as they evolve, changing the outcome of the attack through all the stages of the Endpoint Kill Chain.
For example, deceiving and stopping Ransomware, thinking it succeeded encrypting the files as the solution safeguard them.
Identifying & preventing legitimate apps being used for malicious operations.
For example, stopping execution of powershell/command line initiated from word/excel files that are used by attackers to infect the endpoint.
- ✓ Prevents unknown and sophisticated threats
✓ Very high prevention and detection rates
✓ Real time detection & response
- ✓ System-wide protection with pinpoint handling
✓ Deploys in seconds & Easy to operate
✓ Low resource usage (CPU, memory & disk) - No UX impact
- ✓ NO constant updates
✓ Operates in stand-alone/disconnected & VDI environments
✓ Stops millions of threats using only 1 evasion technique
- ✓ High stability - operates in User-mode
✓ Triggering high-fidelity alerts
✓ Low to non-existing false positive rate
Latest news from our blog
A few days ago it was reported that Israel’s Defense Forces has used deception against Hezbollah, making the latter believe its strike against the IDF was successful and caused several injured soldiers. It’s not the first time deception has been used to trick enemies and in other dangerous situations, here are some examples… #1 – Read more about Deception in real-world situations[…]
So, what can be learned from the Chernobyl disaster and how it can be implemented in Cyber security operations? Lately, everyone is talking about the new HBO miniseries, Chernobyl, portraying one of the biggest man-made disasters which happened 33 years ago near a small city of Pripyat. Chernobyl was an RBMK type nuclear power plant Read more about Chernobyl disaster main lessons for CyberOps in 2019[…]
#1 – Agentless is not really agentless While it’s true that with agentless products you don’t install the vendor’s components on the endpoint itself, the vendor’s server still utilizes existing OS functionality and built-in “agent” to perform the security tasks that are usually implemented in a dedicated agent. This means that the endpoint’s resources are Read more about Endpoint protection & misconceptions[…]
Deceptive Bytes, a leading endpoint deception company that enables enterprises the ability to prevent cyber attacks in real time, announces it was recognized as a Gartner “Cool Vendor” in its 2019 “Cool Vendors in Security Operations and Threat Intelligence” report. “We were excited to hear Deceptive Bytes was recognized as a Gartner Cool Vendor in Read more about Deceptive Bytes recognized as a Gartner Cool Vendor in 2019![…]
OK, maybe not all of them, but here’s the story.. Last month Microsoft released its usual OS updates to Windows on what is known to be Patch Tuesday. Not long after reports started to appear regarding machines freezing that are unable to load after a reboot. It turned out to be an issue with several Read more about AVs: The Windows update that broke them all![…]
Artificial Intelligence (AI) and Machine Learning (ML) are considered the next evolution in computer science as they allow computers to perform complex decisions and tasks that were up until now reserved to humans. Their potential is so powerful that films such as The Terminator depict how they become smarter than their creators, turn against humanity Read more about Why ML/AI is not cyber and endpoint security savior[…]
The new year is around the corner and as we prepare for it, we wanted to take a look at what we should expect, here are some of our predictions for the coming year Malware evasion will spread further and wider According to a recent research by Security Week, 98% of malware uses at least Read more about Predictions for 2019[…]
There are several reasons why cyber security experts urge people to change their thinking when it comes to security… We are informed Like many in their respective fields, we keep tabs on news and events in cyber security so we are more aware of the risks out there and the effects of malware and hacking. Read more about Why cyber security awareness is important for everyone, not just for experts[…]
In our last two posts we’ve shown how vendors like Symantec and Microsoft (among others) miss detecting threats due to the nature of how their engines operate. So how do malware authors know if an environment is safe for them to attack or not? There are plenty of indicators about a system that they check Read more about Tricks used by malware authors to protect their malicious code from detection[…]
Symantec’s Endpoint Protection is not the only Anti-malware engine that has issues related to detection, as we stated before. We have found issues with Microsoft’s Windows Defender engine, which is integrated into Windows since Vista. Test-case: Microsoft Windows Defender Let’s look at Windows Defender and cases where it missed detecting potential threats. Malicious macros In Read more about Deceptive Bytes found detection issues in Microsoft’s Windows Defender[…]