A new and deadly generation of remotely controlled targeted corporate network attacks is challenging core network security assumptions, making prevention centric strategies obsolete. While network security teams are starting to shift their focus from perimeter defense to post-breach detection, traditional detection tools fall short of the mark, either generating far too many false-positives or altogether failing to detect attacks in real time. Deception — the use of decoys, traps, lures and other mechanisms that will be discussed in this paper — is quickly gaining the attention of organizations seeking an efficient post-breach detection technology.
- Download this whitepaper to learn more about:
- What kind of attacker will be attracted to what different type of resources (traps)?
- What deception mechanisms should the defending organization employ?
- Where should they be placed?
- What kind of traps should be used?