Deception is a corporate network and endpoint security solution that works by spreading many traps and honeypots throughout the network to mimic real assets. If an attacker interacts with a decoy, Deception will keep track of the attack vectors that have used throughout the interaction and keep the attacker trapped for as long as possible. These honeypots can run on a virtual or physical operating system and designed to trick attackers into believing they’ve found a way to elevate their privileges on the system and steal credentials. When the trap has activated, alerts have sent to a centralized Deception server that tracks the affected decoy and the attacker’s attack routes.
This category of solutions divided on:
- Deception System
- Honeypot
- Honeytoken
- Honeynet
Always in touch to ensure the continuity of your business!
Stay tuned for our updates. Contact Seeton Cyber Security Team for detailes.
PARTNERS:
|
![]() |
![]() |
![]() |