Protect against unknown & sophisticated threats
Prevent damage to data & assets
Reduce reputational risk
CISOs / IT Managers
Automate responses on
Reduce alerts & false positives
Reduce operational burden
costs & resources
Improve employees productivity
Deceptive Bytes uses the same defenses and techniques viruses use against them,
deceiving them into believing they’re in a hostile or unattractive environment to attack…
For example, the solution makes viruses believe they’re in a sandbox/virtual machine (VM) that are used to detect and analyze them.
If viruses don’t check the environment before they attack or they don’t care about it, the solution stops them by giving
the impression that their attack was successful even though it was already prevented and the endpoint remains intact.
For example, the solution deceives and stops Ransomware that operates immediately, making it believe it succeeded encrypting the files as the solution safeguard them.
Deceptive Bytes identifies legitimate processes being used for malicious operations and
prevents them before any damage is done.
For example, the solution will stop execution of powershell/command line initiated by word or excel files used by attackers to download payloads prior to their malicious execution.
- Prevents unknown and sophisticated threats
Very high prevention and detection rates
Real time detection & response
- System-wide protection with pinpoint handling
Deploys in seconds & Easy to manage
Low resource consumption (CPU, memory & disk)
- NO constant updates
Can operate as stand-alone
Can stop millions of viruses using only 1 evasion technique
- High stability - operates in User-mode
Low to non-existing false positive rate
Latest news from our blog
Artificial Intelligence (AI) and Machine Learning (ML) are considered the next evolution in computer science as they allow computers to perform complex decisions and tasks that were up until now reserved to humans. Their potential is so powerful that films such as The Terminator depict how they become smarter than their creators, turn against humanity Read more about Why ML/AI is not cyber and endpoint security savior[…]
The new year is around the corner and as we prepare for it, we wanted to take a look at what we should expect, here are some of our predictions for the coming year Malware evasion will spread further and wider According to a recent research by Security Week, 98% of malware uses at least Read more about Predictions for 2019[…]
There are several reasons why cyber security experts urge people to change their thinking when it comes to security… We are informed Like many in their respective fields, we keep tabs on news and events in cyber security so we are more aware of the risks out there and the effects of malware and hacking. Read more about Why cyber security awareness is important for everyone, not just for experts[…]
In our last two posts we’ve shown how vendors like Symantec and Microsoft (among others) miss detecting threats due to the nature of how their engines operate. So how do malware authors know if an environment is safe for them to attack or not? There are plenty of indicators about a system that they check Read more about Tricks used by malware authors to protect their malicious code from detection[…]
Symantec’s Endpoint Protection is not the only Anti-malware engine that has issues related to detection, as we stated before. We have found issues with Microsoft’s Windows Defender engine, which is integrated into Windows since Vista. Test-case: Microsoft Windows Defender Let’s look at Windows Defender and cases where it missed detecting potential threats. Malicious macros In Read more about Deceptive Bytes found detection issues in Microsoft’s Windows Defender[…]
In previous posts we explained that traditional Anti-malware software is not working anymore and we gave tips on how to improve your security with non-security tools. But why is your Anti-malware not enough? One of the reasons is that it doesn’t handle changes too well (which is commonplace knowledge among security experts). Background Malware uses Read more about Deceptive Bytes found detection issues in Symantec Endpoint Protection[…]
We were recently listed in Smartrev Cybersec‘s first Israeli cyber startup observatory (Jan-2018 edition) Go to CyberStartupObservatory.com to learn more about Israel’s cyber startup landscape.
We recently talked to vpnMentor, a website dedicated to VPNs and web privacy, about Deceptive Bytes, deception technology and data security. Click here read the interview
CB Insights published their early-stage cyber security (startups) periodic table, stating that the selected companies are considered as the leading startups across different emerging sectors, you can find Deceptive Bytes under deception security. “We put together a periodic table of early-stage cybersecurity that spotlights the industry’s most promising young startups, emerging industry categories, and most active investors.”
There are various security measures you can take in order to protect your endpoint, some might be heavy on the machine and not necessarily that helpful, for instance, the traditional antivirus is only 20-40% effective, according to CheckPoint’s blog post from last year. Nevertheless, we do advise having some sort of security on your endpoint Read more about Improve your security without installing additional security software[…]