Deception technology is a cyber-security defense practice that deceives attackers by distributing a collection of lures and decoys across a system’s infrastructure to imitate genuine assets. Deception technology misdirects attackers away from assets to attack decoys that record their activities while gathering forensics and adversary intelligence. Comprehensive network and endpoint deceptions work together to derail attacks and catch reconnaissance, lateral movement, and credential theft activities.

If a decoy is triggered by an intruder, then the server will log and monitor the attack vectors used throughout the duration of the engagement.


It seems we can't find what you're looking for.