Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


10:00 AM
Dark Reading
Dark Reading
Products and Releases

TrapX Evolves Deception-Based Network Security Beyond IT

New DeceptionGrid 5.2 Provides Emulations for Point-of-Sale Systems and Medical Devices as Well as Industry's First Mac OS Emulation

SAN MATEO, CA — July 26, 2016 — TrapX™, a global leader in advanced cyber security defense, today announced that it has released version 5.2 of its DeceptionGrid™ platform. Available in Q3 2016, the new version expands deception-based security beyond Information Technology (IT) assets, adding emulations for point-of-sale (POS) systems, medical devices and the Mac OS. The new features announced today offer a wider range of decoys that detect a greater number of attack vectors and extend the company’s reach into key vertical markets, including retail and healthcare.

DeceptionGrid provides automated, highly accurate insight into attackers’ lateral movements and malicious activity with real-time detection and defense against zero-day malware and other advanced threats. DeceptionGrid creates a network of traps (decoys) that are intermingled with and imitate a comany’s real information technology assets, creating an environment that attracts and detects malicious insiders as soon as they begin their attacks.

The TrapX DeceptionGrid platform employs a proprietary emulation engine that allows quick decoy creation and deployment without the need for cumbersome operating system software installation and maintenance.  With this software update, DeceptionGrid adds more emulations to its current list of server, endpoint, storage system, network device, VoIP, SCADA, and Internet of Things (IoT) device emulations. Healthcare and retail-specific emulations released in this new update include PACS (Picture Archiving and Communication System), Cat Scan (CT) and MRI machines; image viewers and POS system decoys. TrapX has also further innovated by offering the industry’s first Apple OSX emulation, allowing customers to deploy OSX-based decoys without the need for Apple-specific hardware or software.

In addition, version 5.2 includes updates for TrapX’s DeceptionTokens feature, which leverages an advanced understanding of cyber adversaries’ techniques, tactics and procedures (TTPs) to lure sophisticated attackers into the DeceptionGrid platform. Now, an expanded list of DeceptionTokens™ includes tokens that can be deployed on Linux machines as well as tokens that can divert attackers targeting Mac OS X and other network devices. By extending lightweight, easy-to-deploy, agentless DeceptionTokens onto real-world IT assets, enterprises can quickly identify compromised endpoints before attackers can obtain a persistent foothold in the network.

DeceptionGrid also greatly expands the TrapX partner ecosystem with new integrations into CISCO AMP ThreatGrid™, McAfee DXL and the Arcsight SIEM (CEF) format. And in light of its broader customer and market reach, DeceptionGrid now comes equipped with a spate of new tools, including an enhanced UI and backup-and-restore features.

For security technology to be effective, it must be easy to deploy, scale and manage. Addressing growing enterprise demands for these capabilities, TrapX has added the ability to deploy traps en masse using configuration files, thus allowing organizations to rapidly deploy and manage thousands of traps at the push of a button

“With the growing popularity of Apple Mac OSX and IoT devices, customer environments are becoming increasingly complex and diverse. So to ensure a successful deception strategy, it’s imperative that solutions have turn-key capabilities that imitate the diversity of devices that customers rely on for their daily operations,” said Greg Enriquez, CEO of TrapX Security. “With the new TrapX DeceptionGrid 5.2 enhancements, customers can simply select from a list of options; the system will immediately create the requested trap with no operating system or application installation, thus maximizing value while minimizing setup and management overhead.”

Tweet this: @TrapXSecurity now provides deception-based emulations for POS systems, medical devices and MacOS: http://tinyurl.com/hney4f9

Trademark Notice

TrapX Security™, DeceptionGrid™ and DeceptionTokens™ are trademarks of TrapX Security, Inc.

More Information

Visit the TrapX Website: www.trapx.com

Learn more about DeceptionGrid: http://trapx.com/products/deceptiongrid/

Visit the TrapX blog: http://www.trapx.com/blog/

Follow TrapX on Twitter: @trapxsecurity

Follow TrapX on LinkedIn: https://www.linkedin.com/company/trapx

Like TrapX on Facebook: https://www.facebook.com/pages/TrapX/258804147648401


About TrapX

TrapX Security is the leader in deception technology. Our solutions rapidly detect, analyze and defend against new zero-day and APT attacks in real time. DeceptionGrid provides automated, highly accurate insight into malware and malicious activity unseen by other types of cyber defense. We enable a proactive security posture, fundamentally changing the economics of cyber defense by shifting the cost to the attacker. The TrapX Security customer base includes Forbes Global 2000 commercial and government customers around the world in sectors that include defense, health care, finance, energy, consumer products and other key industries. Learn more at www.trapx.com.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Attackers' Costs Increasing as Businesses Focus on Security
Robert Lemos, Contributing Writer,  11/15/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-11-20
A CWE-200: Information Exposure vulnerability exists in Modicon Controllers (M340 CPUs, M340 communication modules, Premium CPUs, Premium communication modules, Quantum CPUs, Quantum communication modules - see security notification for specific versions), which could cause the disclosure of FTP har...
PUBLISHED: 2019-11-20
A CWE-79: Failure to Preserve Web Page Structure vulnerability exists in Andover Continuum (models 9680, 5740 and 5720, bCX4040, bCX9640, 9900, 9940, 9924 and 9702) , which could enable a successful Cross-site Scripting (XSS attack) when using the products web server.
PUBLISHED: 2019-11-20
Cross-site Scripting (XSS) in Dolibarr ERP/CRM 3.3.1 allows remote attackers to inject arbitrary web script or HTML in functions.lib.php.
PUBLISHED: 2019-11-20
Dolibarr ERP/CRM 3.3.1 does not properly validate user input in viewimage.php and barcode.lib.php which allows remote attackers to execute arbitrary commands.
PUBLISHED: 2019-11-20
The snprintf implementation in PostgreSQL before 9.0.20, 9.1.x before 9.1.16, 9.2.x before 9.2.11, 9.3.x before 9.3.7, and 9.4.x before 9.4.2 does not properly handle system-call errors, which allows attackers to obtain sensitive information or have other unspecified impact via unknown vectors, as d...