geevo®
geevo®
  • Home
  • About
  • Cloud Academy
  • GRC
    • Compliance
    • Governance
    • Risk Management
  • Managed Services
    • Managed Security Services
  • Security Technology
  • Publications
  • Support
  • Contact
  • More
    • Home
    • About
    • Cloud Academy
    • GRC
      • Compliance
      • Governance
      • Risk Management
    • Managed Services
      • Managed Security Services
    • Security Technology
    • Publications
    • Support
    • Contact
  • Home
  • About
  • Cloud Academy
  • GRC
    • Compliance
    • Governance
    • Risk Management
  • Managed Services
    • Managed Security Services
  • Security Technology
  • Publications
  • Support
  • Contact

Cyber Deception Services

  

Cyber deception technology is an emerging tool that can enhance cybersecurity detection and prevention, moving maturity to a more pro-active position. While detection and prevention security tools are useful and provide necessary protection, they do not offer a 100% guarantee that they will detect the sophisticated attacker.


Deception can be addressed in a number of ways:


· HoneyToken deception technology: Fake administrator accounts and files

· HoneyPot deception technology: Seemingly vulnerable devices deliberately placed to attract attackers

· HoneyNet deception technology: Decoy networks seeded with realistic looking devices


The Benefits Of Using Deception Technology

Using cyber deception as part of defence allows the detection of attackers who have evaded other security technologies and controls. Decoys attract attackers or attack tools to interact with attackers and will alert when touched. These decoys can range from manually created administrative accounts linked to SIEM to sophisticated HoneyNets that closely mimic the production environment, whether this be in the cloud, on-premise or even IoT and SCADA networks.


Deception technology is low noise and high value and should form part of a mature cyber security strategy.


About Our Deception Technology Services

geevo® can assess your current cybersecurity maturity and work with you to implement the right type of deception for your environment.


Working with a carefully selected handful of security vendors, geevo® can offer advice on the most suitable cyber security deception solution. geevo® provide a complete solution, from initial set-up and configuration, through to ongoing support, management and optimisation.

Copyright © 2018 - 2023 geevo®, member of CPbros Group - All Rights Reserved.

Powered by GoDaddy

  • Support
  • Privacy Statement
  • Terms and Conditions

Incident Response

Incident Response and Digital Forensics

Instant support

Cookie Policy

This website uses cookies. By continuing to use this site, you accept our use of cookies.

DeclineAccept & Close