Who here has implemented honeypot / honey net solutions? What has your experience been like?

4.7k viewscircle icon2 Upvotescircle icon3 Comments
Sort by:
Chief Security Officer in Software7 years ago

We use honey pots to generate our own threat intel about attacks on our company.

VP of Global IT and Cybersecurity in Manufacturing7 years ago

Traditional honeypot or honey net technology are still out there and used.

A new approach on the use of honeypots would be Deception Technology.

CEO|CIO7 years ago

Wow that is blast from our past, we used to to have one

Lightbulb on1

Content you might like

Implementation complete24%

Implementation in progress46%

Planned within the next 12 months17%

Not planned10%

Not enabling O365 on mobile2%

View Results

Yes82%

No18%