Deception Technology: in-Depth Guide [2019 update]
Though simple deception techniques such as honeypots have been around since 2000s, new deception technology techniques make deception technologies an emerging area to invest in for additional security measures.
What is deception technology?
Traditional network security consists of a limited number of responses which include logging, rejecting, quarantining intrusions. While these responses can block individual attacks, actions such as rejecting are visible to the adversary. Skilled adversaries can learn from these responses, increase the sophistication of their attack and test their target’s defenses. Instead, when dealing with intruders, companies can also rely on their attacker’s greatest weapon: deception.