Know What is Lurking in Your Network

Active Deception for Inside-the-Network Threat Detection

Cyber-attacks are increasing in sophistication and are penetrating networks with ever-greater frequency.  

A modern adaptive defense is no longer solely based solely on stopping attacks, but instead now focuses on detecting and neutralizing attacks in real-time. This paper will cover how BOTs and Advanced Persistent Threats (APTs) work and how to use active deception to detect them once they have bypassed perimeter security systems.

Functional requirements for choosing deception-based threat detection systems and threat intelligence reporting are also explored in this brief.

Additional Resources

Here are some resources that have recently been downloaded by other professionals. 

Introduction to Deception Technology and Attivo Networks

A brief introduction to deception technology and the Attivo Networks Deception and Response Platform