Advanced security solutions that deploy decoys, lures, and traps throughout the network to detect and misdirect attackers. Deception technology goes beyond traditional honeypots by creating an environment of fake assets that appear genuine.
Related Terms
Honeypot
generalA decoy system designed to attract and detect attackers by mimicking real systems or services. Honeypots provide early w...
Sandboxing
generalA security technique that isolates untrusted programs or code in a restricted environment (sandbox) to observe their beh...
Threat Hunting
incident-responseThe proactive process of searching for cyber threats that have evaded existing security controls. Threat hunters use hyp...