Deception is a viable option to improve threat detection and response capabilities. Technical professionals focused on security should evaluate deception as a “low-friction” method to detect threats inside their environments and as an alternative or complement to other detection technologies.
- Introduction to Deception Terms and Techniques
- Deception Technologies Explained
- Deception Platforms
- Features and Capabilities
- Deception in Other Technology Solutions
- Open-Source or Free Deception Technologies
- Where Does Deception Fit Into a Security Architecture?
- When Is Deception a Must?
- Deception Use Cases
- Which Threats Do You Want to Detect With Deception?
- Deploying and Using Deception
- Align Deception With a Budget
- Establishing a Business Case for Deception
- Testing the Tools
- Deploying Deception Tools
- Operating Deception Tools
- Deception Does Not Increase Your Risk, But ...
- The Future of Deception Technologies
- Evaluate Deception Approaches to Detect Attacker Lateral Movement
- Evaluate Deception as an Alternative to Other Detection Tools
- Don’t Forget Deception Prerequisites
- Define a Testing Strategy
- Develop Credible Deceptions to Detect Advanced Threats
- Make Deception Part of Your Security Architecture
- Types of Lures
- Open-Source or Free Deception Tools
Gartner Recommended Reading