18
Cybersecurity 101: An Introduction to Deception Technology

Cybersecurity 101: An Introduction to Deception Technology

Embed Size (px)

Citation preview

Cybersecurity 101:

An Introduction toDeception Technology

Traditional, signature-based security measures continue to fall prey to sophisticated zero-day attacks and APTs.

Deception Technologyis an evolved form of cybersecurity which aims to

turn the current paradigm on its head –

from reactionary to proactive defense.

4 Things Every CIO & CISO Should Know About Deception Technology

1 2 3 4

1 2 3 4

Manipulating the One Thingthat Cyber Attackers Count On

1 2 3 4

Attackers work on the assumption that the

infrastructure data they see is real.

Deception technology uses carefully

designed lures to attract attackers during

infiltration and instantly identify them.

1 2 3 4

Providing Instant Gratification

1 2 3 4

With firewalls and antivirus software, it can

often take months to realize a breach occurred -

but deception technology triggers alerts the

moment an attacker “trips the wire”.

1 2 3 4

Going Beyond Digital Signatures

1 2 3 4The rise of APTs and zero-day attacks show

that attackers are too sophisticated to make

the same mistakes twice.

Deception technology exposes attackers to

ensure their strengths become weaknesses.

1 2 3 4

Simplifying the Solution Stack

1 2 3 4

In-band security appliances often fail to

keep attackers out.

Deception technology eliminates this

issue, given that deceptive lures are

transparent to security staff and are

only used by the attacker.

Why deception technology and why now?

According to research from the

Ponemon Institute, in the US alone,

companies experience an annual loss

of $15 million due to cyber crime.$15

million

It’s clear that current cybersecurity methods

aren’t working as well as companies might

hope, and that a new approach is necessary.

Deception technology

is an “overlay” approach to cybersecurity

that can change the way many organizations

work to prevent data breaches, malicious

code and denial-of-service attacks.

With deception technology in place,

any organization can force attackers into a

world of unreliable data that renders

attacks useless.