Cyber deception technology is an emerging tool that can enhance cybersecurity detection and prevention, moving maturity to a more pro-active position. While detection and prevention security tools are useful and provide necessary protection, they do not offer a 100% guarantee that they will detect the sophisticated attacker.
Deception can be addressed in a number of ways:
· HoneyToken deception technology: Fake administrator accounts and files
· HoneyPot deception technology: Seemingly vulnerable devices deliberately placed to attract attackers
· HoneyNet deception technology: Decoy networks seeded with realistic looking devices
The Benefits Of Using Deception Technology
Using cyber deception as part of defence allows the detection of attackers who have evaded other security technologies and controls. Decoys attract attackers or attack tools to interact with attackers and will alert when touched. These decoys can range from manually created administrative accounts linked to SIEM to sophisticated HoneyNets that closely mimic the production environment, whether this be in the cloud, on-premise or even IoT and SCADA networks.
Deception technology is low noise and high value and should form part of a mature cyber security strategy.
About Our Deception Technology Services
geevo® can assess your current cybersecurity maturity and work with you to implement the right type of deception for your environment.
Working with a carefully selected handful of security vendors, geevo® can offer advice on the most suitable cyber security deception solution. geevo® provide a complete solution, from initial set-up and configuration, through to ongoing support, management and optimisation.
This website uses cookies. By continuing to use this site, you accept our use of cookies.