July 2019 AST Magazine AST July 2019 Magazine | Page 7
www.AmericanSecurityToday.com
July 2019 - Edition 35
How Deception Works
Decoys are projected throughout the
network along with endpoint cre-
dentials, mapped shares, decep-
tion data or applications that will
breadcrumb the attacker back to
an engagement server that will alert
on the presence of an attacker.
Deception Architecture
Believability is critical to enticing the
attacker, and as such Attivo Networks
uses real operating systems, services,
and applications that mirror match the
production environment.
Golden image software can also be used
for 100% matching, and integration with
Active Directory will also validate decep-
tion credentials for authenticity.
Attivo Deception Architecture
5