Decoys, traps & lures: Deception-based security

Capture the Flag with Deception Defenses

Cover

While network security teams are starting to shift their focus from perimeter defense to post-breach detection, traditional threat detection tools fall short of the mark, either generating far too many false-positives or altogether failing to detect attacks in real time. 

Deception-based security is being adopted by leading organizations as an effective and highly accurate method for detecting both human and malware attacks that have penetrated perimeter defenses.

In this white paper, learn more the theory and techniques of deception-based security and get answers to questions such as:

  • What kinds of attackers are attracted to what type of traps?
  • What deception mechanisms should my organization employ?
  • Where should they be placed?
  • What kind of traps should be used?
  • And more
Vendor:
Fidelis
Posted:
21 Aug 2018
Published:
21 Aug 2018
Format:
PDF
Length:
31 Page(s)
Type:
White Paper
Language:
English
Already a Bitpipe member? Login here

Download this White Paper!