The Art of Deception for Advanced Threat Detection
Deception technology has been on security leaders' radar some time, but now it is becoming accessible to smaller organizations. And in their most recent analyses, market analysts give deception technologies kudos for improved sophistication and maturity.
Deception focuses on deploying assets - such as lures, bogus files, honeypots or simulated SCADA or IoT devices - in hopes of diverting attackers from the targets they most desire.
This expert panel discusses the maturity of deception technology solutions, with a focus on:
- What are the critical success factors for deploying deception technology?
- What lessons have been learned by pioneers?
- What are the key questions to ask when searching for a deception solution?