Deception Technology: in-Depth Guide [06/2018 update]

Though simple deception techniques such as honeypots have been around since 2000s, new deception technology techniques make deception technologies an emerging area to invest in for additional security measures.

What is deception technology?

Traditional network security consists of a limited number of responses which include logging, rejecting,¬†quarantining intrusions. While these responses can block individual attacks, actions such as rejecting are visible to the adversary. Skilled adversaries can learn from these responses, increase the sophistication of their attack and test their target’s defenses.¬†Instead, when dealing with intruders, companies can also rely on their attacker’s greatest weapon: deception. Read more

Share

20 Deception Technology Companies: In-depth Guide [2018]

Deception technology is a growing part of modern intrusion detection systems. See our article on deception technology to learn more. Read on to understand deception technology ecosystem and a comprehensive list of vendors.

Deception Technology Ecosystem

Incumbent security software providers

Companies like Symantec provide end-to-end cybersecurity solutions including solutions that include deception technology

Startups

Numerous startups have been launched since 2010s focusing on deception security.

Complete List of Deception Technology Vendors

* Date when tool was launched not the day the company was launched. This is because Symantec’s founding date is irrelevant when discussing their tool which provides features of deception technology. Read more

Share