Deceptive networking lures hackers with decoy data
Deception technology, derived from military and intelligence agencies, is a method of planting decoy endpoints to confuse and slow down attackers. Then you can turn the tables in your favor.
Software to bog down hackers in fake endpoints is the latest trendy method of securing your network. Several startups are already involved in this field, known as deception technology, which can be thought of as a new twist on classic decoydocs.
But whereas a decoydoc is designed to lure a hacker, deception software puts decoy data across your network endpoints, so that if hackers happen to enter they would not know the difference. If accessed, the decoys wake up and inform your IT staff, so you can take countermeasures.