In-Depth Guide to Deception Technology: Definition & Benefits
Simple deception techniques, such as honeypots, which involves setting a trap for the attacker to lure them in, have been around since 2000s. New, AI-powered deception technology techniques enable companies to delay and identify cyber attackers to prevent and manage various cyber attacks.
In this article, we explain what deception technology is, how they are different to traditional deception techniques, and what their benefits are.
What is deception technology?
Traditional network security consists of a limited number of responses which include logging, rejecting, quarantining intrusions. While these responses can block individual attacks, actions such as rejecting are visible to the adversary. Skilled adversaries can learn from these responses, increase the sophistication of their attack and test their target’s defenses. Instead, when dealing with intruders, companies can also rely on their attacker’s greatest weapon: deception.
How are modern deception techniques different to traditional ones?
Deception technology grew out of honeypot security systems. These systems left honeypots or decoy systems & data to attract hackers who have already accessed company’s systems. Once decoy was accessed, internal security team could be alerted and mitigation actions could be taken. Though valuable, these honeypots required significant administration and maintenance.
Modern deception technology involves distributing sensors across an enterprise’s digital assets such as endpoints, network, application and data. These sensors mimic enterprise applications.
Their primary differentiation from the previous generation of honeypots is that grater automation enables minimal setup and maintenance costs. Additionally, they have gained more operational capabilities designed to deceive attackers. Once intrusions are detected, automated responses can be implemented, buying security professionals valuable time. These tools can also use intruders’ trust of internal systems to isolate their access, waste their time and resources.
What are benefits of deception technology?
A deception system can prevent an intruders’ access to critical systems and data, effectively locking the intruder in a decoy network with endpoints, applications and data. While this causes the intruder to waste time, security teams can devise solutions.
Kill chain concept was developed by Lockheed Martin to categorize different phases of a cyber attack. It includes the steps:
- Action on objectives.
Deceptions are possible at every stage of the kill chain. For example, during reconnaissance phase, false data may be shared with suspicious accounts to test if their intention is to illegally access the system.
For more on deception technology
If you are interested in learning more about deception technology, we have a comprehensive list of deception technology providers.
We also have list of deception technology vendors, in case you are interested.
We can help you choose the best one tailored to your needs:
Cem has been the principal analyst at AIMultiple since 2017. AIMultiple informs hundreds of thousands of businesses (as per similarWeb) including 60% of Fortune 500 every month.
Cem's work has been cited by leading global publications including Business Insider, Forbes, Washington Post, global firms like Deloitte, HPE, NGOs like World Economic Forum and supranational organizations like European Commission. You can see more reputable companies and media that referenced AIMultiple.
Throughout his career, Cem served as a tech consultant, tech buyer and tech entrepreneur. He advised businesses on their enterprise software, automation, cloud, AI / ML and other technology related decisions at McKinsey & Company and Altman Solon for more than a decade. He also published a McKinsey report on digitalization.
He led technology strategy and procurement of a telco while reporting to the CEO. He has also led commercial growth of deep tech company Hypatos that reached a 7 digit annual recurring revenue and a 9 digit valuation from 0 within 2 years. Cem's work in Hypatos was covered by leading technology publications like TechCrunch and Business Insider.
Cem regularly speaks at international technology conferences. He graduated from Bogazici University as a computer engineer and holds an MBA from Columbia Business School.
To stay up-to-date on B2B tech & accelerate your enterprise:Follow on
Next to Read
Your email address will not be published. All fields are required.