Hunting the Attackers, not the Attacks

Active Defense

Deception Technology

Post-Breach Defense Detection Based on Deception

The newest generation of remotely controlled network attacks is challenging the effectiveness of traditional detection and prevention tools, making prevention-based approaches less effective. It is only a matter of time before determined cybercriminals penetrate your corporate network and systems. This paradigm shift dictates that organizations change their information risk management strategies from prevention-based to post-breach detection security approaches, if they are to maintain and safeguard their cybersecurity posture.

Prevent threat-actors who have managed to infiltrate your network from moving unimpeded for months, stealing data and intellectual property.

In a Nutshell

What is Active Defense

Lay traps to catch attackers in the event of a breach

Lure and deceive attackers into revealing information about them

Buy valuable time by delaying and misdirecting attackers in your network

How it Works

What it does

Defense “Decoys and Beacon Traps” are designed to detect reconnaissance and malware related activity, as well as to access and/or use planned fake information, which may include user access credentials, database connections and network shares, in order to deceive cybercriminals into thinking they have discovered a way to escalate their privileges, perform lateral movement, and/or access sensitive information/data towards achieving their goals.

If threat-actors attempt any probing or access any fake information, ClearSkies™ Active Defense triggers an alert notification, and delivers attack-vector information to ClearSkies™ Cloud SIEM for further analysis before an incident is escalated. Attack-Vector information provides you with valuable intelligence as to how cybercriminals interact with assets, including their methods, purpose and source.

By occupying cybercriminals for as long as possible with decoys and traps, organizations can delay them from achieving their real purpose, thus gaining valuable time to take necessary defensive actions.


What you get

Active Defense both compliments and capitalizes on the early detection and response capabilities of your SIEM.

Post-Breach Detection

Minimizes the time between the initiation of an attack and its detection.

Decrease attacker dwell time

Drastically reduces the time a successful attacker spends scouting unnoticed within the corporate network and systems.

Comprehensive visibility

Provides comprehensive visibility of the attacker’s intentions in your corporate network.

Reduced False Positives

Focuses on real threats, thus accelerating your organization’s response and overall cyber defense capability, effectively improving your security posture.

Intelligence Gathering

Helps you gather valuable intelligence and collect valuable forensic information about an attack, including methods used, purpose and source, which can be used to both improve your network and system defenses, as well as to construct and support relevant legal cases against the attacker.

Regulatory compliance

Helps you obtain evidence to meet regulatory compliance requirements.


Can be easily scaled at any given time, depending on organizational needs and/or on the information-threat activity level.

No risk

Poses no risk whatsoever to data exchanged/stored and has no impact on the availability/integrity of resources.


What’s under the hood

Automate Incident escalation so your security personnel can be informed even as the attack is already taking place.

Receive incident notifications via email, SMS and/or push notification on smartphones and tablets with ClearSkies™ Mobile App (for iOS and Android) installed. For more detailed information related to incident escalation, refer to the ClearSkies™ Secure Web Portal (SWP) “Event Management” ServiceModule.

Deploy and manage ClearSkies™ Active Defense by your own Security Operations Center (SOC) or by Odyssey’s 24/7 Managed Security/Detection & Response (MDR) Services.


Empower your Active Defence effectiveness with…


Detect & Respond to Malware & Insider Threats Before it is too Late.

Identity & Access

Stay on top of your user base.

Learn More

Get the Datasheet

ClearSkies™ Active Defense both compliments and capitalizes on the early detection and response capabilities of your SIEM.