Deception as a Security Discipline

Going on the Offensive in the Cybersecurity Battlefield

By Frost & Sullivan, Mike Suby

Cyber-attacks, the core focus of security analysts, are the ever-present wild card and a prominent cause for alert generation. Professional attackers, however, are fully aware that deviation-tripping alerts call attention to their activities and potentially put a stop to them. Therefore, they pattern their activities to minimize detection and cozy up to routine operational behaviors. Even when their activities generate alerts, dressed the same as the crowd of operational- and user- triggered alerts, attackers gain time in the pursuit of their ultimate goal - exfiltrating valuable data. 

Focusing on a means to consistently produce high-fidelity alerts that are unmistakably associated with attackers and malicious insiders, Mike Suby analyzes deception technology and the leader in the category; Attivo Networks. This independent report dives deep into the technology as a solution to the most prevalent problems facing cyber security professionals.

Additional Resources

Here are some resources that have recently been downloaded by other professionals. 

Introduction to Deception Technology and Attivo Networks

A brief introduction to deception technology and the Attivo Networks Deception and Response Platform