Proofpoint to Acquire Illusive


Proofpoint today announced it has entered into a definitive agreement to acquire Illusive​. The acquisition is expected to close by January 2023, subject to customary closing conditions.

 The global increase in cyberattacks has been enabled by attackers shifting their tactics and focus to identity-based attacks, with 84% of organisations falling victim to an identity-related breach in the past year. These attacks traverse through identities – from privilege escalation to lateral movement and abuse of Active Directory and cloud environments, such as Microsoft 365. With Illusive, Proofpoint’s unique visibility into the identities that are attacked and vulnerable across an organisation will equip enterprises with unprecedented insights into their privileged access attack surface and uniquely powerful control to better protect their Very Attacked People (VAPs).

“It’s currently far too easy for an attacker to turn one compromised identity into an organisation-wide ransomware incident or data breach,” said Ryan Kalember, executive vice president, cybersecurity strategy, Proofpoint. “The acquisition of Illusive reinforces Proofpoint’s commitment to innovation and growth, bringing market-defining technology to make threat actors’ jobs as difficult as possible.”

“Illusive is solving a problem that others cannot by focusing on protecting identity security vulnerabilities and stopping the menace of ransomware, which has galvanised worldwide demand for our solution,” said Ofer Israeli, founder and CEO, Illusive. “We are thrilled to join Proofpoint and add our unique approach to ITDR to its people-centric security vision, helping organisations remediate privileged identity risks and understand potential ramifications of compromise, such as access to critical data and intellectual property.”

Together, Proofpoint and Illusive will deliver comprehensive identity security as part of Proofpoint’s threat protection platform including:

  • Automatic discovery and remediation of identity vulnerabilities before attackers exploit them with Illusive Spotlight™: with its agentless approach, Illusive Spotlight delivers unparalleled visibility into vulnerable identities by scanning directory structures (e.g., Active Directory), privileged access management (PAM) solutions, endpoints, servers and services, revealing the gaps between the intention of an organisation’s identity security policies and the reality of their environment.
  • Detection and response to identity threats to stop privilege escalation and lateral movement to critical assets with Illusive Shadow™: unlike other deception technologies that deploy agents or honeypots which can tip off or be exploited by the attacker, Illusive Shadow’s agentless architecture prevents attacker detection and is undefeated in over 150 red team exercises. It allows organisations to deterministically accelerate threat detection by identifying threats based on attacker interaction with deceptions, not probabilistic controls based on signatures or behaviors.

Comments are closed.