Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

The ins and outs of deception for cyber security

Carolyn Crandall, CMO, Attivo Networks | Jan. 7, 2016
Today’s deception technologies abandon reliance on known attack patterns and monitoring and use advanced luring techniques and engagement servers

New deception technologies bring a heightened level of aggressiveness in addressing cyber attacks.  Dynamic deception steps in when prevention systems fail and provides organizations with an efficient way to continuously detect intrusions with high interaction traps, engagement servers, and luring techniques to engage attackers--all without requiring additional IT staff to manage the solution

Statistics pointing to the increasing number of threats and the growing sophistication of these threats are in the news every day.  Symantec noted in an April 2015 Internet Security Report that attacks on large companies are up 40% over last year and Dave DeWalt, FireEye’s CEO, stated recently on 60 Minutes, “Literally, 97% of all companies have been breached.” 

According to a recent Ponemon Institute report, the average cost of a breach has risen to $15 million.  With that in mind, corporate management has a responsibility to customers, shareholders, employees and partners to do everything they can to protect critical data and IP assets. 

Dynamic deception solutions are a new, powerful weapon in the IT and security team’s arsenal for protecting an organization’s most critical assets.  Prevention systems have demonstrated that they have gaps and will continue to be unreliable given a perimeterless network, the sophistication of modern day cyber attacks, adoption of new technologies and human errors.

Deception can play a critical role as the next line of defense for detecting intrusions that have made their way inside the network before an attack can be completed and damages done. Breaches can be a costly and time-consuming challenge to deal with. It’s time to turn the tables and use deception to outsmart the hackers and to protect your company’s assets and brand.


Previous Page  1  2  3 

Sign up for CIO Asia eNewsletters.