July 2019 AST Magazine AST July 2019 Magazine | Page 7

www.AmericanSecurityToday.com July 2019 - Edition 35 How Deception Works Decoys are projected throughout the network along with endpoint cre- dentials, mapped shares, decep- tion data or applications that will breadcrumb the attacker back to an engagement server that will alert on the presence of an attacker. Deception Architecture Believability is critical to enticing the attacker, and as such Attivo Networks uses real operating systems, services, and applications that mirror match the production environment. Golden image software can also be used for 100% matching, and integration with Active Directory will also validate decep- tion credentials for authenticity. Attivo Deception Architecture 5