According to Gartner analyst Peter Firstbrook, deception technologies are “the most advanced approach for detecting threats within a network”, and one of its Top Technology Security Trends in 2017.
With security breaches becoming more brazen and aggressive, conventional prevention-based security solutions are no longer seen as a reliable bulwark against today’s cyber threats.
New deception technologies offer IT security personnel a powerful, automated weapon to detect network intrusions - all without requiring additional IT staff to manage the solution.
By adding deception to endpoints and decoys with high interaction traps, engagement servers, and luring techniques, organisations gain accurate detection of initial reconnaissance and harvesting of credentials, along with the offensive advantage to reveal attacks early.
For example, modern deception-based threat detection such as those from Attivo, are so powerful they can turn user networks, data centres, cloud, remote offices into traps. Even specialty environments such as IoT, ICS-SCADA, point-of-sale, telecom, and network infrastructure systems can serve to confuse, misdirect, and reveal the presence of attackers.
Deceptions add a powerful, pre-emptive, defensive solution against advanced attacks without the need to launch a counterattack. Organisations who are already or looking to using advanced security technologies such as endpoint or next-generation firewall solutions should incorporate deception into its strategy for an extra layer of automated protection.
As Sun Tzu notes, “The supreme art of war is to subdue the enemy without fighting.”
Speak to a Singtel security advisor today.