Fidelis Deception

Reduce Dwell Time
By Quickly Detecting
Post-Breach Attacks

Classify network assets and automatically create a deception layer to lure and detect attackers.

Fidelis Deception Explainer Video
 

Fidelis Deception™ Explained

Watch this short video to find out how deception technology provides either a low-risk, low-friction alarm system with emulation or supports security research with full interaction real OS VM decoys that help you detect lateral movement, insiders, and protect non-standard devices including enterprise IoT.

Read our Fidelis Deception™ Datasheet

Automatically Discover and Classify Networks and Assets

Classify all networks and assets, communication paths, and network activity to profile your users, services, and systems. Gain visibility of servers, workstations, enterprise IoT devices, legacy systems and shadow-IT, and ensure an always-current profile as changes occur within your environment to automatically adapt deception layers.

Fidelis Deception Environment

Gain an Accurate View
of Your Network Environment

  • Profile on-premises and cloud environments to classify all networks, assets and their communication paths.
  • Classify all asset types including enterprise IoT devices (printers, servers, cameras, routers, etc.).
  • Discover internal and external activity, web traffic, browser types, and operating systems.
  • Remove blind spots for unknown assets including legacy systems and shadow-IT.

With Fidelis Deception, we’re changing the rules of the game. Now we have the attackers running for cover because they understand that we can find them even if they managed to bypass our perimeter.

-Fortune 1000 Company, Head of Security
Read the Case Study
Read the Pharmaceutical Case Study
 
Fidelis Deception Decoy

Automatically Create and Deploy Deception Layers

Following the automated discovery of an environment, Fidelis Deception uses accurate information to auto-generate decoys for deception layers. Decoys have profiles, services and regular activity matching the environment, plus recommended breadcrumbs for placement on nearby real assets to act as lures to decoys. 

Configuration options are available to customize deception layers by adding real OS VM decoys, golden image OS VM decoys of customer choice, desired manual edits to IT asset and services decoys and much more.

Ensure an Always Up-To-Date
Deception Environment

  • Automatically build realistic deception layers based on accurate discovery profiles.
  • Create full interaction real OS VM decoys or controlled interaction emulation decoys.
  • Automatically deploy, validate access paths and advertise decoys on networks.
  • Make deception deterministic by deploying breadcrumbs on real assets as lures to decoys.
  • Continuously adapt deception layers with automation for network and asset changes.
Reducing Dwell Time with Active Deception.
Learn how to Dwell Time with Active Deception.
Featured Resource:
Reducing Dwell Time with Active Deception.
 

Expose Lateral Movements and Automate Response

Fidelis Deception places attractive breadcrumbs on real assets to lure attackers away from the real resources and data to decoys, interactive services and fake data instead. With Fidelis Deception you can learn attacker TTPs and gain tools specifically for security research. Fidelis Deception also facilitates rapid response with playbooks that support scripts and automated response open to customization.

Fidelis Deception Incidents

Early Detection of Post Breach Attacks

  • Lure attackers with breadcrumbs on real assets to decoys and services to divert and defend.
  • Invoke fake users within Active Directory showing activity on decoys within deception layers.
  • Detect external attacks and insiders to expose reconnaissance and lateral movement.
  • Learn details of attack paths, resource interests and initial compromised foothold systems.

Alerts You Can Trust

Deception defenses provide a proactive opportunity to lure, detect and defend early within post-breach compromise incidents. Alerts come from deception layers unknown to users resulting in low-risk alerts via emulation with high fidelity and no false positives. The result is a low friction, low risk accurate alarm system to detect post-breach attacks. 

For more mature security operations, receive high value alerts from real OS VM decoys or golden image OS VM decoys to learn attack TTPs, analyze and sandbox file uploads, and improve defenses. 

Sharper Signals and No Risk

  • High fidelity alerts come from decoy access, network traffic analysis and poisoned data use.
  • Investigate alerts knowing network paths and asset profiles, communications, plus decoy interaction.
  • Seamless workflow into Fidelis Endpoint for EDR analysis, or Fidelis Network for broader network traffic analysis and DLP.
  • No false positives as deception layers are unknown to users with no reason for access.
  • No risk to data or resources and no impact to users or operations.

Ovum Reviews Seven Leading Deception Solutions Including Fidelis Deception

"Intelligent deception provides post-breach detection and response to the relentless onslaught of advanced attacks, which use previously unseen malware, scripts, macros, and social engineering, against which traditional security technology is ineffective. Fidelis Deception is at the forefront of this development and should be included in any evaluation of proactive defense technology."

Read the Full Report

BEST DECEPTION TECHNOLOGY SOLUTION

Flexible Deployment Options:

On Premises

  • Deception management, traffic analysis, and decoy appliances or software
  • Deception breadcrumbs are software based

Cloud

  • Deception management, traffic analysis, and decoy software for AWS
  • Deception breadcrumbs are software based

Let’s Get Started!
Ready to see how Fidelis Deception
can lure, detect, and defend?
See It In ActionSchedule a Demo