We review vendors based on rigorous testing and research but also take into account your feedback and our affiliate commission with providers. Some providers are owned by our parent company.
Learn more
vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.
Advertising Disclosure

vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

Deceiving Attackers in Real Time with Deceptive Bytes

Ditsa Keren Technology Researcher

Deceptive Bytes was established last year by 3 brothers, to develop an effective solution against unknown and sophisticated malware, using deception technology. We spoke to CTO Avi Lamay to talk about this promising technology, and hear his views on data security. 

What makes Deceptive Bytes unique?

Most cyber companies these days are using AI and machine learning, but these systems are complex, require massive amounts of data and are vulnerable even to small changes and errors. Furthermore, attackers are using the same technologies to counteract the defensive AI/ML. We have a different approach.

There's a lot of malware out there which is very clever and evasive. When planning an attack, attackers try to understand what security systems are installed. They gather information to determine if the attack is worth their effort and if it's safe for them.

Our deception technology stops attackers by generating false information, and deceiving them into believing they’re in a hostile or unattractive environment to attack.

On the offensive side, we stop malware by giving them the impression that their attack was successful even though nothing really happened and the machine is intact.

Our solution proves that even simpler solutions (as oppose to AI/ML) can stop viruses at once. Even though it seems simple, it's actually very efficient. Take NotPetya and WannaCry for example, 2 major viruses which our solution was able to stop within 2 seconds without any damage to the machine and without prior knowledge, while traditional antivirus took up to a week to figure it out, with colossal damages that have yet been recovered.

Who is your typical client?

The Deceptive Bytes solution is suited for enterprises who are aware that current solutions, like traditional antivirus, only cover about 20-40% of their protection; Enterprises that understand that threats are evolving, and that their security should evolve as well.

We used a combination of knowledge and the technology to build a really light weight solution, deployable within seconds. In addition, it doesn’t interfere with the user experience, it doesn’t take many resources, and it makes it easier to defend your endpoints.

How do you handle false positives?

Due to our unique approach, which deviates from commonly employed methods by legitimate software, the occurrence of false positives is exceptionally rare, if not entirely absent. Instead of attempting to comprehend the environment or the attacker, our software operates automatically to deter even minimal risks effectively. Furthermore, we have incorporated additional functionalities to minimize interference with legitimate software, allowing it to operate seamlessly in the background without requiring any action from the user.

Do you ever catch attackers in real time?

There are companies that focus on knowing the attackers and their routes, but it's not in our scope. Rather, our priority is to stop attackers as quickly as possible because every second the attacker is moving laterally in the network or finds access to the organization, gives them better chances of succeeding.

In your opinion, what does the future hold for deception technology?

It’s a growing technology with immense potential and it’s going to change how we defend endpoints in the coming years. Gartner spoke of deception as the cyber technology of the future, they also mentioned us earlier this year on this subject. They said deception is a key aspect to protect your assets and enterprise, as it allows them to create false information and stop attackers quickly.

We review vendors based on rigorous testing and research but also take into account your feedback and our affiliate commission with providers. Some providers are owned by our parent company.
Learn more
vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

About the Author

Ditsa Keren is a cybersecurity expert with a keen interest in technology and digital privacy.

Did you like this article? Rate it!
I hated it! I don't really like it It was ok Pretty good! Loved it!
out of 10 - Voted by users
Thank you for your feedback

Please, comment on how to improve this article. Your feedback matters!

Leave a comment

Sorry, links are not allowed in this field!

Name should contain at least 3 letters

The field content should not exceed 80 letters

Sorry, links are not allowed in this field!

Please enter a valid email address