Assessing Deception Technology for a Proactive Defense

Solution Brief

Attackers have repeatedly demonstrated they can bypass conventional defenses. Deception technology adds the ability to accurately and effectively detect in-network threat lateral movement, at risk credential exposures, and insider policy violations. 

This paper takes a detailed look at what an ideal deception system should encompass, with an emphasis on how deception technology provides protection across all attack surfaces and the wide variety of methods used by attackers. There are many approaches to deception, so a checklist is included to help assess technology options. 

Additional Resources

Here are some resources that have recently been downloaded by other professionals. 

Introduction to Deception Technology and Attivo Networks

A brief introduction to deception technology and the Attivo Networks Deception and Response Platform