July 2019 AST Magazine AST July 2019 Magazine | Page 6
www.AmericanSecurityToday.com
July 2019 - Edition 35
as they try to learn behaviors and endpoint lures, data deceptions,
alert on suspicious behavior.
and traps throughout the network,
giving organizations immediate
A different approach to in-net- visibility needed to derail these
work detection must be applied. attacks and remediate compro-
mised devices.
These security controls must be ca-
pable and accurate in detecting Why Deception
nefarious, policy violation, and risks
Deception works by using deceive
from human error.
traps and lures designed to attract
Deception closes the in-network an attacker into engaging and
detection gap by placing attractive away from production assets.
(See a brief introduction to deception technology and the Attivo Networks ThreatDefend Decep-
tion and Response Platform. )
4