Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Cybersecurity 101: An Introduction to Deception Technology


Published on

Deception technology is an outside-the-box cybersecurity approach that aims to turn the current paradigm on its head – from reactionary to proactive defense.
It’s time for organizations to get proactive, and use deception technology to enhance the way they architect a comprehensive security strategy.

Published in: Technology
  • Be the first to comment

Cybersecurity 101: An Introduction to Deception Technology

  1. 1. Cybersecurity 101: An Introduction to Deception Technology
  2. 2. Traditional,signature-based security measures continue to fall prey to sophisticated zero-day attacks and APTs.
  3. 3. Deception Technology is an evolved form of cybersecurity which aims to turn the current paradigm on its head – from reactionary to proactive defense.
  4. 4. 4 Things Every CIO & CISO Should Know About Deception Technology 1 2 3 4
  5. 5. 1 2 3 4 Manipulating the One Thing that Cyber Attackers Count On
  6. 6. 1 2 3 4 Attackers work on the assumption that the infrastructure data they see is real. Deception technology uses carefully designed lures to attract attackers during infiltration and instantly identify them.
  7. 7. 1 2 3 4 Providing Instant Gratification
  8. 8. 1 2 3 4 With firewalls and antivirus software,it can often take months to realize a breach occurred - but deception technology triggers alerts the moment an attacker “trips the wire”.
  9. 9. 1 2 3 4 Going Beyond Digital Signatures
  10. 10. 1 2 3 4 The rise of APTs and zero-day attacks show that attackers are too sophisticated to make the same mistakes twice. Deception technology exposes attackers to ensure their strengths become weaknesses.
  11. 11. 1 2 3 4 Simplifying the Solution Stack
  12. 12. 1 2 3 4 In-band security appliances often fail to keep attackers out. Deception technology eliminates this issue,given that deceptive lures are transparent to security staff and are only used by the attacker.
  13. 13. Why deception technology and why now?
  14. 14. According to research from the Ponemon Institute,in the US alone, companies experience an annual loss of $15 million due to cyber crime. $15 million
  15. 15. It’s clear that current cybersecurity methods aren’t working as well as companies might hope,and that a new approach is necessary.
  16. 16. Deception technology is an “overlay” approach to cybersecurity that can change the way many organizations work to prevent data breaches,malicious code and denial-of-service attacks.
  17. 17. With deception technology in place, any organization can force attackers into a world of unreliable data that renders attacks useless.
  18. 18. Request a Demo