Deceptive Bytes, a leading endpoint deception company that enables enterprises the ability to prevent cyber attacks in real time, announces it was recognized as a Gartner “Cool Vendor” in its 2019 “Cool Vendors in Security Operations and Threat Intelligence” report.
“We were excited to hear Deceptive Bytes was recognized as a Gartner Cool Vendor in 2019. For us, this reaffirms Deception as a game changer for enterprises, and that Deceptive Bytes provides enterprises with an innovative solution which bolsters their security posture and helps them prevent sophisticated threats.”
Sagi Lamay, CEO & Co-Founder
What analysts are recommending in SecOps
To select security monitoring technologies and vendors, security and risk management leaders should:
- Evaluate providers through trials, rather than only through RFP processes. Many solutions boast simple, fast deployments and cloud-based management, resulting in trials that are low- or no cost to the organization.
- Ignore vendor terminology (such as ML, AI and analytics), and test providers on their ability to apply their technology solution to the organization’s specific use cases, risks and needs.
How Deceptive Bytes helps
Deceptive Bytes provides an innovative solution against threats in enterprises’ most critical and exposed assets, their endpoints. The solution creates dynamic & deceptive information which interferes with any attempt to recon the environment and deters the attacker from executing its malicious intents, through all the stages of compromise in the Attack Kill Chain – covering advanced & sophisticated malware techniques, constantly making sure all the endpoints & data in the enterprise are secured.
Cool Vendors in Security Operations and Threat Intelligence was released on May 14th, 2019 by Kelly Kavanagh, Ruggero Contu, Augusto Barros & Pete Shoard.
For additional information, contact us email@example.com
Required disclaimer: The GARTNER COOL VENDOR badge is a trademark and service mark of Gartner, Inc., and/or its affiliates, and is used herein with permission. All rights reserved. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s Research & Advisory organization and should not be construed as statements of fact. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.