White paper:
A Case Study View of Deception Technology in Security Testing

Whether security testing is driven by compliance or as part of standard security resiliency testing, it is a vital component of an organization’s defenses, especially in today’s era of high-profile breaches. Over the past few years, there have been unrelenting reports highlighting successful security breaches that resulted in massive amounts of compromised personal information, IP theft, financial loss, ransomware attacks, and even attacks on energy and medical organizations, which put human safety at risk. With the growing sophistication and frequency of attacks, organizations, now more than ever, need to evaluate the effectiveness of their defenses to identify and quickly close gaps that attackers could exploit. A penetration test (pentest), Red Team evaluation, or Purple Team1 exercise can play an instrumental role in identifying weaknesses with both security infrastructure and processes.