Deception technology was introduced as an advanced security solution to detect and prevent targeted attacks. Deceptions are achieved through the use of purposeful obfuscations, deceitful responses, feints, misdirection, and falsehoods.
Deception in this context is used as a technique for defensive or disruptive purposes. Many organizations do not understand what threat deception is. Thus, educating security buyers about its importance will be crucial to furthering adoption of deception technologies and its concepts.
“A new class of products with distributed endpoint decoys is emerging with threat deception capabilities that can enhance an end-user’s defenses. In these security products, distributed decoy systems are used to portray deception across multiple layers of interaction. These layers and data elements act as deceptive lures that aid in the deception, disruption, or misleading the attacker and the attack automation software,” says Amrita Choudhury, a lead analyst at Technavio for research on IT security.
Read complete news on the given link