July 2019 AST Magazine AST July 2019 Magazine | Page 8
Deception
technology plays a critical
www.AmericanSecurityToday.com
role in changing this paradigm by de-
tecting attacks that have bypassed oth-
er security controls, early and accurate-
ly, regardless of the methods used to
compromise the network.
Since deception uses traps and lures
to detect an adversary, the solution is
not reliant on signatures or database
look up.
This makes deception scalable and capa-
ble of reliably detecting attackers using
ever-changing attack methods and tar-
geting rapidly evolving attack surfaces.
Deception technology
provides
July 2019 - Edition
35
the “eyes within the network”
visibility to threats that have by-
passed perimeter defenses.
By laying a maze of decoys, lures,
and mis-directions security teams
can accurately and efficiently de-
tect early reconnaissance, lateral
movement, and credential theft,
improving detection time and re-
ducing attacker dwell time.
This is where the Attivo Threat-
Defend platform has proven its
One simple touch of the deception
environment provides a substantiat- value with its ability to detect
ed alert with details of attempted ac- any attacker using any attack
tions.
vector on any attack surface.
6