Illusive Networks, Fortinet FortiDeceptor und Proofpoint-Lösungen (Shadow & Identity Threat Assessment)

Table of Contents:

Tags:

Introduction

In today’s era dominated by digital threats, advanced cyber security strategies are essential. Illusive Networks (part of Proofpoint), Fortinet with its FortiDeceptor product and Proofpoint’s Shadow and Identity Threat Assessment offer innovative solutions. This blog analysis combines the functions and strategic roles of these technologies and emphasises their importance in the area of Identity Threat Detection and Response (ITDR).

Illusive Networks and Fortinet FortiDeceptor: Detailed comparison and proofpoint enhancements

  • Illusive Networks (part of Proofpoint):
  • Core expertise: specialises in ITDR to combat identity-based cyber threats.
  • Technology and capabilities: Utilises agentless technology and deception techniques to proactively detect and remediate identity risks.
  • Integration with Proofpoint: Acquisition by Proofpoint strengthened Illusive’s position in the cybersecurity market with expanded ITDR capabilities and resources.
  • Strategic Advantage: Provides a broad range of solutions focused on detecting complex threats and protecting sensitive identity data.
  • Fortinet FortiDeceptor:
  • Focus: Focuses on honeypot technologies to defend against cyberattacks through deception.
  • Role in cyber security: Active detection and response to unauthorised activity by deception systems.
  • Distinguishing features: Specialises in creating deception environments to trap attackers, complements traditional security approaches.

Proofpoint ITDR-Solutions: Shadow & Identity Threat Assessment

  • Proofpoint Shadow:
  • Advantages: Enables early detection of attackers, provides comprehensive threat investigation and reduces false positives.
  • Approach: Creates a deception network on endpoints to detect and alert on lateral movement of attackers.
  • Technology: Agentless architecture that differs from traditional tools based on signatures or behavioural analysis.
  • Proofpoint Identity Threat Assessment:
  • Process: a SaaS-based process to quickly deliver actionable insights and vulnerabilities.
  • Insights: Identifies risks such as unmanaged local admin access, misconfigured privileged credentials and exposed admin accounts commonly exploited in ransomware attacks and advanced persistent threats (APTs).
  • Significance: Detects privileged identity risks on one in six corporate endpoints, which plays an essential role in preventing security compromise.

Final consideration

Illusive Networks, Fortinet FortiDeceptor and Proofpoint’s Shadow and Identity Threat Assessment offer critical solutions for the modern cyber security market. Illusive, now supported by Proofpoint, offers a wide range of ITDR solutions. FortiDeceptor, on the other hand, provides deep insights into attacker strategies through honeypot technology and works with other Fortinet products via the Fortinet Security Fabric. Proofpoint solutions complement these technologies with advanced deception techniques, precise threat analyses and identity risk identification. Together, they form a comprehensive safety net against modern cyber threats and are essential for effective cyber security strategies that provide both preventative and reactive measures against a wide range of threats.

Resources:

Illusive (now part of Proofpoint)

https://www.proofpoint.com/us/resources/solution-briefs/identity-threat-detection-and-response

Proofpoint Spotlight

https://www.proofpoint.com/sites/default/files/solution-briefs/pfpt-us-sb-spotlight.pdf

Proofpoint Shadow

https://www.proofpoint.com/sites/default/files/solution-briefs/pfpt-us-sb-shadow.pdf

Proofpoint Identity Threat Defense

https://www.proofpoint.com/sites/default/files/data-sheets/pfpt-us-ds-identity-threat-assessment-brochure.pdf

Fortinet FortiDeceptor

https://www.fortinet.com/content/dam/fortinet/assets/data-sheets/FortiDeceptor.pdf

Author

Gerd Pflüger

Systems Engineer

Gerd Pflueger is a systems engineer with over 20 years of professional experience. He works at Fortinet as a Cyber Security Architect for the DACH region, where he is responsible for the planning and implementation of security solutions for regional customers. Before joining Fortinet, Gerd was Lead Solution Engineer at VMware for seven years. Prior to that, he was a Distinguished Systems Engineer at Cisco Systems in Central Europe.