Active Breach Defense

Allure deploys deceptive techniques in real operational environments, eliminating the burdens of creating and maintaining honey environments. We do this by dropping patented decoy documents, deceptive documents embedded with beacons, in operational folders, directories and cloud shares, creating an alarm system with GPS for confidential data. When Allure decoy documents are opened, real-time alerts are generated with proprietary geofence and telemetry insights to detect early breach activity, respond with countermeasures, and identify leakers and hackers.

Detect . Respond . Identify
Detect early breach activity

Allure’s patented decoy documents are 98% effective in detecting early-stage breach activity, according to DARPA research. Allure’s approach combines the power of deceptive documents and beacons, which are strategically placed to align with attacker behavior and generate actionable insights to initiate and inform real-time response.

Respond with countermeasures

The proprietary geofence and telemetry insights gathered from every opening of a decoy document is logged, and real-time alerts are generated based on desired criteria. Take immediate steps to thwart the attack, and use the alert insights to take corrective actions to prevent future incidents.

Identify leakers & hackers

Beacons in Allure decoy documents are undetectable by attackers, making them very effective in active investigations, both inside and outside the organization. Allure users can pierce hacker’s preferred tactics and lines of communication to gather attacker insights, and reveal leakers and hackers.

Delivered entirely as a service via restful API, Allure decoy documents require no software to download, no agents to install and no hardware to configure. Mean time to value is measured in minutes, with limited to no daily overhead from a personnel resource constraint.

Active Breach Defense

Request a Demo