Deception - this is a solution for protecting the corporate network and end devices, working by spreading many traps and baits throughout the network to simulate real assets. If an attacker interacts with a decoy, Deception will track the attack vectors that were used throughout the entire interaction and keep the attacker on this trap for as long as possible. These decoys can run on a virtual or physical operating system and are designed to make attackers believe that they have found a way to increase their rights in the system and steal credentials. When the trap has been activated, notifications are sent to a centralized Deception server that tracks the affected bait and the attacker's attack routes.
This category of solutions can be divided into:
- Deception System
- Honeypot
- Honeytoken
- Honeynet
Always in touch to ensure the continuity of your business!
Learn more and get advice from Seeton Cyber Security Group!
REFERRAL PARTNERS: