Protect against unknown & sophisticated threats
Reduce reputational risk
Prevent damage to
data & assets
Reduce operational burden
CISOs / IT Managers
Automate responses on
Reduce alerts & false positives
Use Windows built-in security tools: Defender & Firewall
Adapt to changes in IT environments
Operate in unpatched/vulnerable environments
costs & resources
Protect remote employees
Deceptive Bytes provides an innovative solution against threats in enterprises’ most critical and exposed assets, their endpoints!
The solution creates dynamic & deceptive information which interferes with any attempt to recon the environment and deters the attacker from executing its malicious intents, through all the stages of compromise in the Attack Kill Chain – covering advanced & sophisticated malware techniques, constantly making sure all the endpoints & data in the enterprise are secured.
Making malware believe it’s in an unattractive/hostile environment to attack and reducing the chances of a successful attack.
For example, creating a sandbox/VM environment which deter malware.
Actively responding to threats as they evolve, changing the outcome of the attack through all the stages of the Endpoint Kill Chain.
For example, deceiving and stopping Ransomware, thinking it succeeded encrypting the files as the solution safeguard them.
Identifying & preventing legitimate apps being used for malicious operations.
For example, stopping execution of powershell/command line initiated from word/excel files that are used by attackers to infect the endpoint.
- ✓ Prevents unknown and sophisticated threats
✓ Very high prevention and detection rates
✓ Real time detection & response
- ✓ System-wide protection with pinpoint handling
✓ Deploys in seconds & Easy to operate
✓ Low resource usage (CPU, memory & disk) - No UX impact
- ✓ NO constant updates
✓ Operates in stand-alone/disconnected & VDI environments
✓ Stops millions of threats using only 1 evasion technique
- ✓ High stability - operates in User-mode
✓ Triggering high-fidelity alerts
✓ Low to non-existing false positive rate
Latest news from our blog
Every day, all around the world, malware is attacking organizations and businesses from all sizes, affecting their day-to-day activities and causing businesses losses which can be significant. When you think about it, all it takes is one little malware to take down even the biggest of organizations. This reminds me of the epiphany moment David Read more about The little virus that took down an empire[…]
Deceptive Bytes latest version and first release of 2020 brings with it an additional boost to organizations’ cyber security stack as we added the capability to control Windows Defender & Windows Firewall through our platform. “Deceptive Bytes enables enterprises, SMBs and MSSPs to bolster their security with a lightweight solution that reduces operational burden & Read more about Deceptive Bytes integrated Windows Defender & Firewall to its platform[…]
There are many injection techniques used by malware authors, from simply calling CreateRemoteThread to advance ones like AtomBombing, PROPagate & others. How basic DLL injections work? Usually when a malware initiates a DLL injection, it does the following Open or create a process for injection (via CreateProcess/OpenProcess API calls) Allocate memory in said process (via Read more about The “Early Bird Special” – a new twist on the “Early Bird” injection technique[…]
A few days ago it was reported that Israel’s Defense Forces has used deception against Hezbollah, making the latter believe its strike against the IDF was successful and caused several injured soldiers. It’s not the first time deception has been used to trick enemies and in other dangerous situations, here are some examples… #1 – Read more about Deception in real-world situations[…]
So, what can be learned from the Chernobyl disaster and how it can be implemented in Cyber security operations? Lately, everyone is talking about the new HBO miniseries, Chernobyl, portraying one of the biggest man-made disasters which happened 33 years ago near a small city of Pripyat. Chernobyl was an RBMK type nuclear power plant Read more about Chernobyl disaster main lessons for CyberOps in 2019[…]
#1 – Agentless is not really agentless While it’s true that with agentless products you don’t install the vendor’s components on the endpoint itself, the vendor’s server still utilizes existing OS functionality and built-in “agent” to perform the security tasks that are usually implemented in a dedicated agent. This means that the endpoint’s resources are Read more about Endpoint protection & misconceptions[…]
Deceptive Bytes, a leading endpoint deception company that enables enterprises the ability to prevent cyber attacks in real time, announces it was recognized as a Gartner “Cool Vendor” in its 2019 “Cool Vendors in Security Operations and Threat Intelligence” report. “We were excited to hear Deceptive Bytes was recognized as a Gartner Cool Vendor in Read more about Deceptive Bytes recognized as a Gartner Cool Vendor in 2019![…]
OK, maybe not all of them, but here’s the story.. Last month Microsoft released its usual OS updates to Windows on what is known to be Patch Tuesday. Not long after reports started to appear regarding machines freezing that are unable to load after a reboot. It turned out to be an issue with several Read more about AVs: The Windows update that broke them all![…]
Artificial Intelligence (AI) and Machine Learning (ML) are considered the next evolution in computer science as they allow computers to perform complex decisions and tasks that were up until now reserved to humans. Their potential is so powerful that films such as The Terminator depict how they become smarter than their creators, turn against humanity Read more about Why ML/AI is not cyber and endpoint security savior[…]
The new year is around the corner and as we prepare for it, we wanted to take a look at what we should expect, here are some of our predictions for the coming year Malware evasion will spread further and wider According to a recent research by Security Week, 98% of malware uses at least Read more about Predictions for 2019[…]