July 2019 AST Magazine AST July 2019 Magazine | Page 6

www.AmericanSecurityToday.com July 2019 - Edition 35 as they try to learn behaviors and endpoint lures, data deceptions, alert on suspicious behavior. and traps throughout the network, giving organizations immediate A different approach to in-net- visibility needed to derail these work detection must be applied. attacks and remediate compro- mised devices. These security controls must be ca- pable and accurate in detecting Why Deception nefarious, policy violation, and risks Deception works by using deceive from human error. traps and lures designed to attract Deception closes the in-network an attacker into engaging and detection gap by placing attractive away from production assets. (See a brief introduction to deception technology and the Attivo Networks ThreatDefend Decep- tion and Response Platform. ) 4