The newest technology to enter the security space, “Deception Technology”, sometimes referred to as decoy-based intrusion detection is a honeypot decoy quickly becoming “a must have” added layer of defense in every company’s IT security arsenal.
Honeypot technology has been used for many years in IT research but is now proving to be a valuable technique in deception and decoy based IT security. Honeypots are servers or systems setup to collect information about an attackers’ means, motives and opportunity. As an additional layer to your existing security and Intrusion Detection Systems (IDS), honeypots provide a focus on information gathering and deception.
Deploying deceptive technology aids in the prevention of attacks by decelerating and hindering both automated and human methods commonly used by adversaries to gain access and exfiltrate your data.