The Fidelis Deception Technology For Threat Mitigation

Fidelis Deception is one of the components of the Fidelis Elevate platform. Which is also released by Fidelis Cybersecurity. So, what is Fidelis Deception? And how can it help you improve your post-breach detection capabilities?

How Does Fidelis Deception Work?

As one of the components of the Fidelis Elevate platform, Fidelis Deception combats the spectrum of cyberattacks. This is done by providing full visibility across hybrid, cloud, or on-premise environments.

It also alerts the organization’s cyber terrain. How? By deploying decoys and breadcrumbs. These will then misdirect the threats to a deception environment.

As the networks change, the decoys also adapt to match. Moreover, each decoy has its IP. And they appear to be just another network’s element.

The Breadcrumbs, on the other hand, will add context to the deception story. It then lures the attackers to the decoys. The Registry keys also placed on existing networks provide credentials to the fake assets and decoys.

So in short, Fidelis Deception’s goal is to catch attackers inside the network. To lure them into the decoys. Or into the sophisticated data traps and active directory deception.

And by interacting with the attackers, Fidelis reports on the full attack story via security visibility. And this uses asset profiling, anomaly detection.

As well as forensics and threat-chain analysis. Thus learning TTPs and building a storyboard.

The Use Of Deception Technology For Threat Mitigation

Deception is now a popular detection technology. And that’s because of the unique advantages it offers.

For instance, deception has highly accurate triggered alerts. It also offers relatively effortless deployment and maintenance.

Although the value of this software is clear, too often organizations use deception for detection. So clearly, they miss out on the full potential of technology.

Fidelis Unveils Active Deception Technology

The new Fidelis Deception module delivers a deception defense platform. This platform will extend visibility and detection deep into the network. It will also learn new attacker techniques. Moreover, it will defend better the organization’s critical data assets.

Mr. Roland Daccache is a senior regional sales engineer, MENA at Fidelis Cybersecurity. He said;

“Regardless of the techniques—behavioral, signature-based, machine learning—used by traditional security stack solutions like anti-virus (AV), next-gen firewall (NGFW), and sandbox, attackers and advanced malware are slipping through the cracks.”

He also said that the need for better detection and response creates opportunities. Such opportunities are security stack automation, integration, as well as consolidation, and orchestration.

Additionally, Fidelis Deception goes a step further. It creates evidence of credentials and connections from “breadcrumbs” throughout the network. And these “breadcrumbs” are irresistible to attackers.

These lead the attackers towards a persuasive decoy network. This helps security professionals to detect, learn, and defend.

Fidelis Conducts A CTF Challenge

Fidelis’s research team recently conducted a CTF challenge. CTF means “Capture the Flag.” In this challenge, 50 professional hackers and security experts showcased their knowledge and skills.

They will be trying to extract a predefined piece of data and stay undetected. The result is interesting. 1 or more of the deception mechanisms planted detected 100% of attackers. And 66% of them were lured to and detected by the decoys.

Rate this post:

Leave a Comment

Your email address will not be published. Required fields are marked *