Stop Advanced Cyber Threats With Deception Technology

By deploying hundreds of unique deception tripwires, IllusionBLACK maximises attack detection through the kill-chain, even against stealthy, targeted campaigns that don’t involve malware.


IllusionBLACK features rapid out-of-band deployment, no performance impact, enterprise scalability, and minimal false positives, leading to faster breach detection and improved security and incident response team productivity.


From targeted threat intelligence of an impending attack, to detecting lateral movement in every single subnet, Smokescreen’s deception technology helps turn the tables on apex attackers.

Full Kill-Chain Coverage

IllusionBLACK decoys detect pre-attack reconnaissance, spear-phishing attacks, privilege escalation, lateral movement and data-theft.

Deep Network Visibility

Instantly deploy 100's of individually unique, customisable traps across all your endpoints and in every single subnet of your network.

Attack Vector Agnostic

Deception does not rely on static signatures or heuristics to identify attacks, so it stays effective no matter what the bad guys try tomorrow.

IllusionBLACK detects threats no matter what they attack

It has advanced 3rd generation deception features, including…


Realistic auto-created decoy data fills deceptive assets with always unique, instantly changing content.


Natural language attack reconstruction parses raw attack data into plain-English attack analysis.

Automated triage

Agentless investigation of compromised endpoints to reduce root cause analysis time and capture volatile forensic information.


Integrate deception into any web or mobile application to guard against business logic attacks.


Redirect attacks to decoy cloud environments to keep attackers engaged while containment kicks in.

Forensic preservation

All evidence recorded and preserved for further analysis in industry standard formats.

Smart Integrations

Logic-driven automatic response and orchestration to execute response strategies at wire-speed.

Hardened BSD UNIX base

Rock-solid security built for highly-targeted environments, coupled with BSD UNIX's legendary reliability.

Threat intelligence export

Machine consumable through STIX, JSON and CSV, as well as integrations with other security infrastructure.

I want to learn more…


In-depth analysis of deception and targeted threat protection.


Brief collateral on IllusionBLACK and deception technology

Use Cases

See how IllusionBLACK solves different security problems


Watch videos on IllusionBLACK and deception technology

Get a live demonstration of the latest deception technology