Whereas most cybersecurity firms pour assets into AI fashions, huge compute, hoovering up all the information, and enhanced analytics to detect and stop threats, Frenetik, a Maryland cyber startup, is betting on one thing easier: ensuring attackers don’t know what defenders know.
The corporate emerged at the moment with a essentially completely different method utilizing novel cyber deception and a newly issued U.S. patent to again it.
“The business has turned cybersecurity right into a compute and evaluation warfare,” stated founder Hans Ismirnioglou. “Larger fashions, extra knowledge, sooner evaluation. However you’ll be able to’t out-compute or out-analyze an adversary perpetually. We’re not attempting to. We’re exploiting data asymmetry.”
Conventional deception instruments deploy pretend methods, look ahead to attackers to seek out them, and hope they work together. Frenetik’s patented “Deception In-Use” expertise (U.S. Patent 12,463,981 – “Techniques and Strategies for Counter-Reconnaissance in Cloud Infrastructure to Disrupt Adversarial Focusing on”) takes a special path: it repeatedly rotates really used identities and assets throughout Microsoft Entra (M365), AWS, Google Cloud, and on-premises environments. The essential particulars of who modified, what modified, when, the place, and the way journey via out-of-band channels accessible solely to trusted events.
Defenders keep knowledgeable. Attackers work from stale intelligence. “Adversaries, particularly AI-driven ones, construct fashions based mostly on reconnaissance. They assume the atmosphere they mapped earlier is the atmosphere they’ll exploit at the moment,” Ismirnioglou defined. “We break that assumption with no need a much bigger GPU cluster by merely depriving them of simply discoverable data.”
Customers can consider it as musical chairs for hackers: by the point they determine the place to sit down, every little thing has moved—and solely defenders know which chairs are actual and which have turn into traps.
The expertise transforms current deception instruments from passive traps into energetic ones. When Frenetik rotates actual assets, attackers following stale intelligence get funneled straight into honeypots and decoys, supercharging interplay charges with basic deception parts that beforehand solely hoped to look actual. Not like options requiring intensive tuning or analyst oversight, Frenetik works as a result of attackers merely lack the data wanted to know the distinction.
“I need the adversary to should repeatedly put a devoted physique onto each goal they go after – no extra free lunches or simple days for America’s adversaries,” says Ismirnioglou.
About Frenetik
Frenetik, a Maryland-based cybersecurity startup, simply emerged from stealth with a brand new method: as a substitute of flooding defenders with extra knowledge, it starves attackers of the data they should transfer. Targeted on measurable safety outcomes, and pricing transparency, Frenetik is constructed to tip the steadiness of energy by denying adversaries reliable perception into focused environments. Frenetik provides a free neighborhood model at www.frenetik.us.
Contact
Founder
Hans Ismirnioglou
Frenetik
information@frenetik.us

