Deception Cybersecurity
“Deception networks, known also as decoy or honeypot, emerge as a frontline technology to divert cyber attacks elsewhere from vital nodes of IT systems and issue early warning. The Deception Cybersecurity Doctrine assumes that perfect security is unattainable. Given that starting point, and the assumption that all systems are compromised, deception cybersecurity focuses on enabling the continued safe operation in a compromised environment and to have systems that are economically defensible rather than perfectly secure.”
Market Analysis
The concept illustrated: Some of these doors are traps to lure attacker. The real entrance to the system is protected by multitude of fake trap doors.
“Attivo is changing the game on attackers by empowering organizations with a proactive defense that sets traps and lures designed to derail their attacks,” said Tushar Kothari, CEO of Attivo Networks. “We are honored that the Golden Bridge Awards is recognizing the company’s technology innovation, leadership, and creative marketing initiatives. This is the 53rd award recognition for Attivo Networks to date and is a testament to the value of enterprise-grade, scalable deception technology.”
“Earning Gold Status in the Deception Technology category, the ThreatDefend™ platform works by creating decoys that appear as production assets and by creating deceptive credentials on the endpoint designed to misdirect attacks into a deception environment. The solution entices in-network attackers with highly authentic looking credentials, decoys, applications, and database deceptions designed to attract adversaries into engaging. Through the deception environment’s collection of adversary intelligence, organizations will gain valuable insight into attacker intent and threat intelligence required for blocking attacks, eradicating the threat, and returning adversary mitigation.”
Cybersecurity Market
Leave a Reply