Avantgard provides active cyber defence services developing campaigns to proactively protect our clients from cyber attack. Active cyber defence employs cyber intelligence, deception and active threat hunting to detect malicious activity sooner and more reliably than is possible with passive defence. Avantgard draws together leading Australian & International capability in Active Cyber Defence. Our work is done in the context of our national laws and of each client’s unique “regulatory universe”.Request a consultation today.
We survey our client’s online presence from an attacker perspective, then plant tempting deceptive elements where attackers will look. These deceptive resources are irresistible to attackers who are led to traps where their activity is recorded while the defender is alerted.The defender gets these benefits:
- Enhanced cyber resilience – you know exactly what your attackers are doing and what tools they are using against you from day to day;
- Assurance that breaches will be detected quickly;
- Zero false positives reduces staff workload;
- Detection of even previously unknown malware;
- Works even in unhygienic environments with legacy infrastructure
Passive cyber defence relies on conventional cyber security practices such as network hygiene, firewalls, virus filters, good user behaviour etc. By itself, passive cyber defence has proven to be ineffective against sophisticated attacks.Active Cyber Defence vs Cyber Offence!
Active Cyber Defence excludes offensive cyber actions which are the sole domain of authorised government agencies.
TrapX has created a new generation of deception technology that provides real-time breach detection and prevention. Our field proven solution deceives would-be attackers with turn-key decoys (traps) that “imitate” your true assets. Hundreds or thousands of traps can be deployed with little effort, creating a virtual mine field for cyberattacks, alerting you to any malicious activity with actionable intelligence immediately. TrapX’s customer base includes over 300 Forbes Global 2000 commercial and government customers worldwide.Avantgard represents TrapX in Australia and NZ.
Avantgard represents WorldStack in Australia and NZ
HoneyTrace is an Australian sovereign solution for data loss detection The HoneyTrace solution uses AI technologies to generate unique fake tokens (tracers), such as documents, database records, website redirects, credit cards numbers and email addresses. These tracers contain watermarks and tripwires, providing unique fingerprints that are used to discover and track data theft inside and outside your network. All tracers are unique, and are not needed for any business purpose, so any interaction with them or appearance outside your network is suspicious.Avantgard represents HoneyTrace in Australia and NZ.
HoneyTrace intelligent search bots are always working— scanning the Internet and deep web for unique tokens created by HoneyTrace to alert you when leaked data is detected. If your data has been stolen, the embedded tokens can be used to identify what parts of your network have been breached. By regularly rotating your tracers, you can determine when the data was breached.
Who We Are
Founder & CEO
Phill is a seasoned technology architect, influencer, and trusted advisor to Fortune 500 and Government agencies.
Phill’s career has spanned Australia’s largest commercial and Government entities in Architecture and Management roles within the Security and Infrastructure Domains, including at Telstra, Big Pond, Sun Microsystems, Sydney Water and Okta.
Phill has first hand experience and an understanding dealing with cyber breaches and the severe impacts of these attacks have on unprepared businesses.
He has specialist knowledge and experience across the utility, telecommunications & financial services (banking, insurance) domains.
Focusing on on Active Cyber Defence techniques, starting with active cyber intelligence, deception tools and lawful counter-measures for both on-premise and cloud workloads in order to gain a deeper understand for more effective target controls to tip the balance back in favour of the defender.
Yoav (Joe) Saar (Lt. Colonel Retired)
TrapX Technical Datasheet
Cyber Deception without limits. A technical product overview
CylusOne Cybersecurity for rail Signaling
CylusOne provides a complete and real-time view of the entire network with detailed information that covers all levels; from the network’s entire topology down to the granular level of each and every asset, including trackside devices, interlockings, management workstations and more.
TrapX WhitePaper - Simplifying Adoption MITRE ATT&CK with Deception
Deception takes a fundamentally different approach to cybersecurity, and offers unique benefits for those looking for insight to support ATT&CK prioritization. Unlike other security controls, deception draws the attacker in. The moment an attacker interacts with a trap, they reveal themselves and their tactics, techniques, and procedures.
ACDA Whitepaper - How to Respond to a Cyber Crisis
Active response uses cyber deception, negotiation and dark web intelligence to extract intelligence from the attacker, shape attacker behaviour and assure eradication. Such an intelligence led approach provides better outcomes with greater assurance of recovery and lowered risk of repeat attacks
Medical Device Hijacking Medjack.4
TrapX Investigative Report – Over the last six months, TrapX Labs conducted the world’s first counter-intelligence cyber-deception operation by creating a fake hospital network and disseminating VPN credentials for it in the Darknet. Extensive data was collected on threat actors targeting healthcare providers and unearthed several cases of MEDJACKING
White Paper - Assertive Cyber Security - Avantgard
The deception strategy assumes that a proficient hacking team will find a way in, often through just one machine, network share or database. They will then begin to move laterally to explore the environment, looking for the valuable assets.
If network shares can be set up that are in every sense genuine, and are linked and ‘breadcrumbed’ across the network, but in fact only exist to be visited by hackers, we have the potential for an irresistible decoy trap.
Seems like Microsoft is leading the world in using existing law to counter cyber crime. There is a lot of scope to apply the same principle in applying Australian law in cyber defence. @helaineleggatRead More
Further evidence of how polarised the world is becoming. Also further insight into just how powerful America is when it seriously flexes its muscles. Potentially a lot of innocent bystanders may get hurt on the sidelines.Read More
My thoughts on this "Whether or not to Hack Back" panel discussion.Read More
This is not good news for any organisation with valuable intellectual property. There is abundant evidence that passive defensive measures are insufficient to detect and counter this highly resourced and motivated threat. Civilian… https://t.co/l7aaDVn2UbRead More
Tomorrow's ACDA - (Active Cyber Defence Alliance) webinar looks to be interesting. We'll have @JohnPowell_JP on how deception works within the ISO and ISM standards, @pgmoore on how deception works in Critical Infrastructure using NIST and IEC62443 stan…Read More
Duncan Unwin MAICD is speaking at Could cyber deception have detected the SolarWinds breach? ACDA Webinar. Check out the event detailsRead More
I'm delighted to announce the first in a webinar series by the Active Cyber Defence Alliance laying out insights on how cyber intelligence and cyber deception enable effective cyber defence and impose meaningful costs on adversaries. The inaugural sess…Read More
This temporary restraining order issued on behalf of Microsoft last month is interesting in that the causes of action, eg "Common Law Trespass to Chattels", - provide a fascinating interpretation and use of old/other laws in defend… https://t.co/kmrKuyo9spRead More
It is hard to quantify the potential for bad things to happen to vulnerable as a result of this data breach. It highlights the need for a more active approach to data loss Intelligence. Data leak, whether malicious or accidental, w… https://t.co/UZSA3NNXmhRead More
Apologies to those who registered for the Holistic Cyber Threat Intelligence webinar tomorrow. Unfortunately we've has to postpone this event. We hope to be able to the deliver the material in the near future. Regards AndrewRead More