» » Proofpoint Buys Deception Tech Startup Illusive Networks

Proofpoint Buys Deception Tech Startup Illusive Networks

Proofpoint Buys Deception Tech Startup Illusive Networks

House › Cyberwarfare

Proofpoint Buys Deception Tech Startup Illusive Networks

By Ryan Naraine on December 12, 2022

Tweet

Enterprise safety vendor Proofpoint on Monday introduced plans to amass Illusive Networks, a startup that helped pioneer deception know-how to assist detect information breaches. Monetary phrases of the deliberate acquisition weren’t disclosed.

Illusive Networks, a Sequence B startup with roots in Tel Aviv, Israel, raised a complete of $54 million in enterprise capital investments since its creation in 2014.

Illusive Networks was among the many first startups to construct so-called cyber deception applied sciences that promised early breach detection through the usage of decoy property triggering alerts.

The corporate marketed a product that introduced a “a hostile atmosphere for attackers,” specializing in stopping lateral motion on already-compromised networks.

For Thoma Bravo-owned Proofpoint, the deliberate Illusive Networks deal underscores the corporate’s plans to grow to be a full-fledged enterporise safety powerhouse. Proofpoint is already an entrenched participant within the e mail safety area and the addition of breach-detection tooling provides to a broadening portfolio of safety merchandise.

[ Information Evaluation: The Race to Discover Income in Securing E-mail ]

Primarily based in Sunnyvale, Calif., Proofpoint is going through intense competitors from a wave of well-funded startups trying to eat away at its buyer base. The corporate has responded with aggression on the acquisition entrance, snapping up corporations like Meta Networks ($120 million deal), ObserveIT ($225 million all-cash deal), Wombat ($255 million deal) and Cloudmark ($110 million deal) to develop past e-mail safety choices.

The corporate mentioned the Illusive Community buy provides tooling for proactive id threat discovery and remediation in addition to a powerful post-breach protection capabilities.

As soon as the deal closes, the plan is to develop the Proofpoint product portfolio to incorporate computerized discovery and remediation of id vulnerabilities earlier than attackers exploit them, and detection and response to id threats to cease privilege escalation and lateral motion to crucial property. 

Proofpoint generates about $1 billion in cybersecurity-related income yearly.

Associated: Illusive Networks Raises $24 Million in Sequence B1 Funding Spherical 

Associated: Thoma Bravo Buys Proofpoint in $12.three Billion All-Money Deal

Associated: New Product Makes use of Deception to Defend SWIFT-connected Banks

Get the Each day Briefing

 
 
 

  • Most Current
  • Most Learn
  • Fortinet Ships Emergency Patch for Already-Exploited VPN Flaw
  • Proofpoint Buys Deception Tech Startup Illusive Networks
  • US Proclaims Costs, Arrests Over Multi-Million-Greenback Cybercrime Schemes
  • The Potential and Pitfalls of a Federal Privateness Legislation
  • Customers Warned of New Aerst, ScareCrow, and Vohuk Ransomware Households
  • Python, JavaScript Builders Focused With Pretend Packages Delivering Ransomware
  • Rackspace Hit With Lawsuits Over Ransomware Assault
  • System Exploits Earn Hackers Almost $1 Million at Pwn2Own Toronto 2022
  • As Wiretap Claims Rattle Authorities, Greece Bans Spy ware
  • Video: Deep Dive on PIPEDREAM/Incontroller ICS Assault Framework

On the lookout for Malware in All of the Mistaken Locations?

First Step For The Web’s subsequent 25 years: Including Safety to the DNS

Tattle Story: What Your Pc Says About You

Be in a Place to Act By way of Cyber Situational Consciousness

Report Exhibits Closely Regulated Industries Letting Social Networking Apps Run Rampant

2010, A Nice 12 months To Be a Scammer.

Do not Let DNS be Your Single Level of Failure

Find out how to Determine Malware in a Blink

Defining and Debating Cyber Warfare

The 5 A’s that Make Cybercrime so Enticing

Find out how to Defend In opposition to DDoS Assaults

Safety Budgets Not in Line with Threats

Anycast – Three Causes Why Your DNS Community Ought to Use It

The Evolution of the Prolonged Enterprise: Safety Methods for Ahead Considering Organizations

Utilizing DNS Throughout the Prolonged Enterprise: It’s Dangerous Enterprise

author-Orbit Brain
Orbit Brain
Orbit Brain is the senior science writer and technology expert. Our aim provides the best information about technology and web development designing SEO graphics designing video animation tutorials and how to use software easy ways
and much more. Like Best Service Latest Technology, Information Technology, Personal Tech Blogs, Technology Blog Topics, Technology Blogs For Students, Futurism Blog.

Cyber Security News Related Articles