The technology works by generating traps or deception decoys that mimic legitimate technology assets throughout the infrastructure. These decoys can run in a virtual or real operating system environment and are designed to trick the cybercriminal into thinking they have discovered a way to escalate privileges and steal credentials. Once a trap is triggered, notifications are broadcast to a centralized deception server that records the affected decoy and the attack vectors that were used by the cybercriminal.
Deception Key Benefits
Accurate and early in-network threat detection for any threat vector
Comprehensive solution with scalability for evolving attack surfaces
Automated deployment and operation through Machine learning
Detailed attack and root cause analysis with substantiated alerts and forensic reporting
Accelerated incident response through 3rd party integrations that automate isolation, blocking, and threat hunting