Deception plays an instrumental role in detecting attacks early, before damages can be done.
Unlike UBA and other monitoring detection, deception is designed to catch the early reconnaissance and credential harvesting vs. trying to learn patterns or assess anomalies that get lost in endless logs and false positives. Deception is engagement-based so instead of telling you there is a needle in a haystack, it will provide you with the needle and when using Attivo, provide the attack detail behind the incident.
Organizations change the asymmetry on attackers by placing high-interaction traps and lures that efficiently reveal an attacker’s presence.
Attivo Networks®, the award-winning leader in deception technology for cybersecurity defense, today announced industry validations that Attivo Networks deception effectively fools attackers. Validating deception’s ability to serve as a reliable security control for closing in-network detection gaps, the company has released results of a penetration test conducted by a top computer forensics company that specializes in penetration testing, announced the ThreatInject simulation tool for testing deception resiliency, and is embedding deception into the ISSA International Conference Capture the Flag (CTF) event. By creating an authentic synthetic network based on deception, organizations change the asymmetry on attackers by placing high-interaction traps and lures that efficiently reveal an attacker’s presence.