Contactez-nous Suivez-nous sur Twitter En francais English Language

De la Théorie à la pratique

Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN



Merck KGaA, Darmstadt, Germany, Selects illusive networks Deceptions Everywhere Cybersecurity

May 2017 by Emmanuelle Lamandé

illusive networks announced that Merck KGaA, Darmstadt, Germany, a science and technology company, selected illusive to protect its vast network across the Americas, Europe, Africa, Asia, and Oceania from advanced cyber attacks.

The pharmaceutical and chemical company selected illusive to supplement its existing security controls with a deception-based post-breach cybersecurity technology to neutralize targeted attacks and Advanced Persistent Threats (APTs) that make their way into the group’s network.

“In today’s hostile climate, you never know when a new vulnerability or a new bypass technique may arise,” says Branden Newman, Head of Business Technology Security and Deputy CISO, Merck KGaA, Darmstadt, Germany. “Deception-based technologies are amongst the best to mitigate advanced attackers while providing a higher level of insight into the malicious activity. illusive networks offers the most innovative and effective approach to deception technology. Additionally, their solution is scalable and easy to deploy.”

With increasingly complex Advanced Persistent Threats and cases of corporate espionage on the rise, the group aimed to enhance the protection of their intellectual property in the chemical and healthcare sectors, particularly their most sensitive data and zones. Bolstering their comprehensive security monitoring was also an objective to ensure the earliest detection and mitigation of cyber attacks, minimizing impact to their business operations.

illusive networks’ agentless Deceptions Everywhere technology blankets a company’s entire network — every endpoint, server and network component – with information that deceives attackers. When attackers act upon the false information, illusive neutralizes the attack and triggers a detailed real-time breach report enabling security administrators to detect, track and contain the attack in its early stages.

See previous articles


See next articles