Simple deception techniques such as honeypots have been around since 2000s. New, AI-powered deception technology techniques enable companies to delay and identify cyber attackers to prevent and manage various cyber attacks.
What is deception technology?
Traditional network security consists of a limited number of responses which include logging, rejecting, quarantining intrusions. While these responses can block individual attacks, actions such as rejecting are visible to the adversary. Skilled adversaries can learn from these responses, increase the sophistication of their attack and test their target’s defenses. Instead, when dealing with intruders, companies can also rely on their attacker’s greatest weapon: deception.