Top Banner
Cybersecurity 101: An Introduction to Deception Technology
18

Cybersecurity 101: An Introduction to Deception Technology

Jan 11, 2017

Download

Technology

David Hunt
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cybersecurity 101: An Introduction to Deception Technology

Cybersecurity 101:

An Introduction toDeception Technology

Page 2: Cybersecurity 101: An Introduction to Deception Technology

Traditional, signature-based security measures continue to fall prey to sophisticated zero-day attacks and APTs.

Page 3: Cybersecurity 101: An Introduction to Deception Technology

Deception Technologyis an evolved form of cybersecurity which aims to

turn the current paradigm on its head –

from reactionary to proactive defense.

Page 4: Cybersecurity 101: An Introduction to Deception Technology

4 Things Every CIO & CISO Should Know About Deception Technology

1 2 3 4

Page 5: Cybersecurity 101: An Introduction to Deception Technology

1 2 3 4

Manipulating the One Thingthat Cyber Attackers Count On

Page 6: Cybersecurity 101: An Introduction to Deception Technology

1 2 3 4

Attackers work on the assumption that the

infrastructure data they see is real.

Deception technology uses carefully

designed lures to attract attackers during

infiltration and instantly identify them.

Page 7: Cybersecurity 101: An Introduction to Deception Technology

1 2 3 4

Providing Instant Gratification

Page 8: Cybersecurity 101: An Introduction to Deception Technology

1 2 3 4

With firewalls and antivirus software, it can

often take months to realize a breach occurred -

but deception technology triggers alerts the

moment an attacker “trips the wire”.

Page 9: Cybersecurity 101: An Introduction to Deception Technology

1 2 3 4

Going Beyond Digital Signatures

Page 10: Cybersecurity 101: An Introduction to Deception Technology

1 2 3 4The rise of APTs and zero-day attacks show

that attackers are too sophisticated to make

the same mistakes twice.

Deception technology exposes attackers to

ensure their strengths become weaknesses.

Page 11: Cybersecurity 101: An Introduction to Deception Technology

1 2 3 4

Simplifying the Solution Stack

Page 12: Cybersecurity 101: An Introduction to Deception Technology

1 2 3 4

In-band security appliances often fail to

keep attackers out.

Deception technology eliminates this

issue, given that deceptive lures are

transparent to security staff and are

only used by the attacker.

Page 13: Cybersecurity 101: An Introduction to Deception Technology

Why deception technology and why now?

Page 14: Cybersecurity 101: An Introduction to Deception Technology

According to research from the

Ponemon Institute, in the US alone,

companies experience an annual loss

of $15 million due to cyber crime.$15

million

Page 15: Cybersecurity 101: An Introduction to Deception Technology

It’s clear that current cybersecurity methods

aren’t working as well as companies might

hope, and that a new approach is necessary.

Page 16: Cybersecurity 101: An Introduction to Deception Technology

Deception technology

is an “overlay” approach to cybersecurity

that can change the way many organizations

work to prevent data breaches, malicious

code and denial-of-service attacks.

Page 17: Cybersecurity 101: An Introduction to Deception Technology

With deception technology in place,

any organization can force attackers into a

world of unreliable data that renders

attacks useless.