Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


10:00 AM
Dark Reading
Dark Reading
Products and Releases

TrapX Evolves Deception-Based Network Security Beyond IT

New DeceptionGrid 5.2 Provides Emulations for Point-of-Sale Systems and Medical Devices as Well as Industry's First Mac OS Emulation

SAN MATEO, CA — July 26, 2016 — TrapX™, a global leader in advanced cyber security defense, today announced that it has released version 5.2 of its DeceptionGrid™ platform. Available in Q3 2016, the new version expands deception-based security beyond Information Technology (IT) assets, adding emulations for point-of-sale (POS) systems, medical devices and the Mac OS. The new features announced today offer a wider range of decoys that detect a greater number of attack vectors and extend the company’s reach into key vertical markets, including retail and healthcare.

DeceptionGrid provides automated, highly accurate insight into attackers’ lateral movements and malicious activity with real-time detection and defense against zero-day malware and other advanced threats. DeceptionGrid creates a network of traps (decoys) that are intermingled with and imitate a comany’s real information technology assets, creating an environment that attracts and detects malicious insiders as soon as they begin their attacks.

The TrapX DeceptionGrid platform employs a proprietary emulation engine that allows quick decoy creation and deployment without the need for cumbersome operating system software installation and maintenance.  With this software update, DeceptionGrid adds more emulations to its current list of server, endpoint, storage system, network device, VoIP, SCADA, and Internet of Things (IoT) device emulations. Healthcare and retail-specific emulations released in this new update include PACS (Picture Archiving and Communication System), Cat Scan (CT) and MRI machines; image viewers and POS system decoys. TrapX has also further innovated by offering the industry’s first Apple OSX emulation, allowing customers to deploy OSX-based decoys without the need for Apple-specific hardware or software.

In addition, version 5.2 includes updates for TrapX’s DeceptionTokens feature, which leverages an advanced understanding of cyber adversaries’ techniques, tactics and procedures (TTPs) to lure sophisticated attackers into the DeceptionGrid platform. Now, an expanded list of DeceptionTokens™ includes tokens that can be deployed on Linux machines as well as tokens that can divert attackers targeting Mac OS X and other network devices. By extending lightweight, easy-to-deploy, agentless DeceptionTokens onto real-world IT assets, enterprises can quickly identify compromised endpoints before attackers can obtain a persistent foothold in the network.

DeceptionGrid also greatly expands the TrapX partner ecosystem with new integrations into CISCO AMP ThreatGrid™, McAfee DXL and the Arcsight SIEM (CEF) format. And in light of its broader customer and market reach, DeceptionGrid now comes equipped with a spate of new tools, including an enhanced UI and backup-and-restore features.

For security technology to be effective, it must be easy to deploy, scale and manage. Addressing growing enterprise demands for these capabilities, TrapX has added the ability to deploy traps en masse using configuration files, thus allowing organizations to rapidly deploy and manage thousands of traps at the push of a button

“With the growing popularity of Apple Mac OSX and IoT devices, customer environments are becoming increasingly complex and diverse. So to ensure a successful deception strategy, it’s imperative that solutions have turn-key capabilities that imitate the diversity of devices that customers rely on for their daily operations,” said Greg Enriquez, CEO of TrapX Security. “With the new TrapX DeceptionGrid 5.2 enhancements, customers can simply select from a list of options; the system will immediately create the requested trap with no operating system or application installation, thus maximizing value while minimizing setup and management overhead.”

Tweet this: @TrapXSecurity now provides deception-based emulations for POS systems, medical devices and MacOS: http://tinyurl.com/hney4f9

Trademark Notice

TrapX Security™, DeceptionGrid™ and DeceptionTokens™ are trademarks of TrapX Security, Inc.

More Information

Visit the TrapX Website: www.trapx.com

Learn more about DeceptionGrid: http://trapx.com/products/deceptiongrid/

Visit the TrapX blog: http://www.trapx.com/blog/

Follow TrapX on Twitter: @trapxsecurity

Follow TrapX on LinkedIn: https://www.linkedin.com/company/trapx

Like TrapX on Facebook: https://www.facebook.com/pages/TrapX/258804147648401


About TrapX

TrapX Security is the leader in deception technology. Our solutions rapidly detect, analyze and defend against new zero-day and APT attacks in real time. DeceptionGrid provides automated, highly accurate insight into malware and malicious activity unseen by other types of cyber defense. We enable a proactive security posture, fundamentally changing the economics of cyber defense by shifting the cost to the attacker. The TrapX Security customer base includes Forbes Global 2000 commercial and government customers around the world in sectors that include defense, health care, finance, energy, consumer products and other key industries. Learn more at www.trapx.com.


Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/10/2020
Researcher Finds New Office Macro Attacks for MacOS
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/7/2020
Hacking It as a CISO: Advice for Security Leadership
Kelly Sheridan, Staff Editor, Dark Reading,  8/10/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-08-12
The ALPS ALPINE touchpad driver before 8.2206.1717.634, as used on various Dell, HP, and Lenovo laptops, allows attackers to conduct Path Disclosure attacks via a "fake" DLL file.
PUBLISHED: 2020-08-12
Sonatype Nexus Repository Manager OSS/Pro before 3.26.0 has Incorrect Access Control.
PUBLISHED: 2020-08-12
search.php in the Nova Lite theme before 1.3.9 for WordPress allows Reflected XSS.
PUBLISHED: 2020-08-12
PHP-Fusion 9.03 allows XSS via the error_log file.
PUBLISHED: 2020-08-12
PHP-Fusion 9.03 allows XSS on the preview page.