Avantgard - Active Cyber Defence
Avantgard is an Australian company providing cyber defence services to Australian & NZ critical infrastructure and government
Active Cyber Defence
Avantgard provides active cyber defence services developing campaigns to proactively protect our clients from cyber attack. Active cyber defence employs cyber intelligence, deception and active threat hunting to detect malicious activity sooner and more reliably than is possible with passive defence. Avantgard draws together leading Australian & International capability in Active Cyber Defence. Our work is done in the context of our national laws and of each client’s unique “regulatory universe”.
Request a consultation today.
How does Active Cyber Defence work?
We survey our client’s online presence from an attacker perspective, then plant tempting deceptive elements where attackers will look. These deceptive resources are irresistible to attackers who are led to traps where their activity is recorded while the defender is alerted.
The defender gets these benefits:
- Enhanced cyber resilience – you know exactly what your attackers are doing and what tools they are using against you from day to day;
- Assurance that breaches will be detected quickly;
- Zero false positives reduces staff workload;
- Detection of even previously unknown malware;
- Works even in unhygienic environments with legacy infrastructure
What is Passive Cyber Defence?
Passive cyber defence relies on conventional cyber security practices such as network hygiene, firewalls, virus filters, good user behaviour etc. By itself, passive cyber defence has proven to be ineffective against sophisticated attacks.
Active Cyber Defence vs Cyber Offence!
Active Cyber Defence excludes offensive cyber actions which are the sole domain of authorised government agencies.
TrapX has created a new generation of deception technology that provides real-time breach detection and prevention. Our field proven solution deceives would-be attackers with turn-key decoys (traps) that “imitate” your true assets. Hundreds or thousands of traps can be deployed with little effort, creating a virtual mine field for cyberattacks, alerting you to any malicious activity with actionable intelligence immediately. TrapX’s customer base includes over 300 Forbes Global 2000 commercial and government customers worldwide.
Avantgard represents TrapX in Australia and NZ.
Cylus was founded to help mainline and urban railway companies avoid safety incidents and service disruptions caused by cyber-attacks. Cylus offers solutions that are specifically designed to address the unique requirements and needs of the railway industry, enabling to detect cyber threats in signalling and control networks, trackside and onboard, facilitating an effective response before harm happens. Led by veterans from the Israel Defense Forces’ Elite Technological Unit together with top executives from the railway industry, Cylus combines deep expertise in cybersecurity and rail.
Avantgard represents Cylus in Australia and NZ
Who We Are
Founder & CEO
Yoav (Joe) Saar (Lt. Colonel Retired)
TrapX Technical Datasheet
Cyber Deception without limits. A technical product overview
CylusOne Cybersecurity for rail Signaling
CylusOne provides a complete and real-time view of the entire network with detailed information that covers all levels; from the network’s entire topology down to the granular level of each and every asset, including trackside devices, interlockings, management workstations and more.
TrapX WhitePaper - Simplifying Adoption MITRE ATT&CK with Deception
Deception takes a fundamentally different approach to cybersecurity, and offers unique benefits for those looking for insight to support ATT&CK prioritization. Unlike other security controls, deception draws the attacker in. The moment an attacker interacts with a trap, they reveal themselves and their tactics, techniques, and procedures.
ACDA Whitepaper - How to Respond to a Cyber Crisis
Active response uses cyber deception, negotiation and dark web intelligence to extract intelligence from the attacker, shape attacker behaviour and assure eradication. Such an intelligence led approach provides better outcomes with greater assurance of recovery and lowered risk of repeat attacks
Medical Device Hijacking Medjack.4
TrapX Investigative Report – Over the last six months, TrapX Labs conducted the world’s first counter-intelligence cyber-deception operation by creating a fake hospital network and disseminating VPN credentials for it in the Darknet. Extensive data was collected on threat actors targeting healthcare providers and unearthed several cases of MEDJACKING
White Paper - Assertive Cyber Security - Avantgard
The deception strategy assumes that a proficient hacking team will find a way in, often through just one machine, network share or database. They will then begin to move laterally to explore the environment, looking for the valuable assets.
If network shares can be set up that are in every sense genuine, and are linked and ‘breadcrumbed’ across the network, but in fact only exist to be visited by hackers, we have the potential for an irresistible decoy trap.
This is a cogent webinar by our partners Cylus where CEO Amir Levintal dissects the challenge of rail cyber security and lays out a coherent response. Thanks RISSB for hosting. #railcybersecurityRead More
Nice to see Microsoft going public with their active cyber defence posture. "We also try to make it more difficult for criminals to operate by disrupting their activities through legal action. By taking proactive action to seize th… https://t.co/jZCSI22eYWRead More
This looks to be an interesting example of information warfare/fake news as I am assured that all is operating calmly at Israel Railways. However it does indicate that rail operations are an interesting target for hybrid warfare. #… https://t.co/mZfwhyraSWRead More
I was surprised by a statement in this article conflating active [cyber] defence with hacking back. "Active defence, hacking back, or retaliatory hacking, is illegal in Australia." While hacking back is illegal, active cyber defen… https://t.co/MKUPaTX9hLRead More
On more thorough reading of Israel's "Guidelines for a National Cyber Strategy", I like this key recommendation in support of Active Cyber Defence on page 79; "We recommend formulating an approach based on active defense. This proc… https://t.co/AV7iVrdD5mRead More
I find this very encouraging for Active Cyber Defence and specifically cyber-deception methods; "1. Construct the system with a combination of tools and capabilities that do not require previous information and knowledge of attack… https://t.co/AV7iVrdD5mRead More
Great speach yesterday by Marise Payne. “a perfect demonstration of what Australia is about in 2020 – playing an active role, exerting our influence and using our capacity in alignment with our values, while being consistent, clear… https://t.co/sJgXHC73TURead More
Turns out that achieving a high level of cyber hygiene is really hard. It would be interesting to quantify the cost benefit curve of perfecting cyber hygiene versus augmenting detection active cyber defence measures such as #cyberd… https://t.co/SMECg5QkmDRead More
Yigal Unner is not mincing words. “he said, “this is the first time we can see something like that aiming to cause damage to real life, not to IT [Information Technology], not to data, which is pretty serious by itself in the moder… https://t.co/TDdqbZ5l81Read More
Given these recent apparent Russian moves, there might well be added urgency for cyber deception on IoT devices would easily reveal the construction of a Botnet, without the attacker realising they had been exposed. This could then… https://t.co/AC97YCW20YRead More