Build a Business Case for Deception Technology

Written by: Francesco Trama | Published on: October 1st, 2019

About The Author

Francesco Trama
Francesco Trama As Chief Executive Officer and Founder, Frank is responsible for the overall operating performance, leading the strategic direction of the company’s products and solutions internally while building technical and business credibility externally as a market-facing thought leader.

Three unique use cases build a business case for deception technology

NCSAM 2019I’m launching National Cyber Security Awareness Month (NCSAM) today with a business case blog for Deception Technology. According to a recent IDG report, Deception Technology ranked 2nd among the technologies that companies have on their radar, or are actively researching, with 40% of respondents. Deception is an emerging technology taking priority and getting noticed by analysts and organizations around the world. Its use aligns with one of the core focuses of NCSAM shared by the FBI – to secure and protect critical data and infrastructure. Own IT. Secure IT. Protect IT.

Use Cases for Deception Make the Case

1. Integrated Detection, Prevention and Response
Deception360 combines internal and external facing lightweight deception artifacts to detect, prevent and respond to threats automatically. It uses adaptive responses without complex orchestrations, delivering practical results in the shortest timeframe. For threats on the network, the solution amplifies detection, reduces dwell time and produces high fidelity alerts. It can actively prevent the exfiltration of data and connections to command and control. Perimeter threat prevention uses external-facing decoys and supports a Moving Target Defense (MTD) making networks harder to identify while overcoming limitations of traditional static perimeters.

2. Vendor Risk Management
Lightweight deception and other features continuously analyze vendor traffic as it interacts with your network in real-time. This includes behavior at the edge and behavior behind the firewall. Internal and external vendor-specific traffic activity occurring outside of normal, pre-approved operating ranges hit decoys and can be easily identified and acted upon. Unique rules can be assigned to each third party based on perceived vendor risk.

3. OT Network Defense
PacketViper for operational technology (OT) is a deception-based, adaptive network security solution that passively monitors the OT network without scanning. This approach improves visibility while gathering intelligence on network threats that are performing reconnaissance and moving laterally within the network. You have the option to respond to attacks at wire speeds both within a segment or across an enterprise. This zero false-positive solution is not based on known attack signatures. As with the other use cases, highly substantiated alerts are a critical part of the solution, along with graduated, adaptive response capabilities.

During National Cybersecurity Awareness Month, PacketViper joins in asking every user of a connected device to Own IT. Secure IT. Protect IT. Help raise awareness about the importance of cybersecurity throughout October!

About National Cyber Security Awareness Month (NCSAM)

In 2003, the National Cyber Security Division within the Department of Homeland Security and the nonprofit National Cyber Security Alliance, launched NCSAM to raise awareness about the importance of cybersecurity and to help Americans stay safe and secure online. Look for security tips throughout October by following #GetCyberSafe, #CyberAware or visit https://www.staysafeonline.org/NCSAM.