Support Login

Overview

Threat Deception for an Expanded Attack Surface

The ThreatDefend deception portfolio provides deception for servers, clouds, user networks, and specialized environments such as IoT, Medical IoT, SCADA, and POS. Coverage also extends to network infrastructure such as routers and switches, telecommunications devices, and specialized applications and services such as SWIFT, Big Data, print, and retail web portals.

BENEFITS

Defend all attack surfaces on the network, from network and specialized devices to special-use services and applications.

Device

  • Defend Cisco Router, Switch, and Telephony devices
  • Defend IoT, Medical IoT, ICS/SCADA, and POS devices
  • Alert on attacks targeting OT and networks infrastructure

Services

  • Defend services such as printer, web, and camera streaming
  • Identify unauthorized file transfer and remote access activity
  • Identify service-based points of entry attackers can compromise

Applications

  • Leverage capabilities for Big Data and database applications
  • Project decoy SWIFT servers or retail web application portals
  • Expand cloud deception with decoy Docker apps

“The reason deception makes so much sense in healthcare is that we operate a high number of patient critical medical devices that often do not talk vertically through monitored Internet connections or across monitored firewall zones… Surrounding medical devices with virtual decoys within the same network segment provides a way to catch potential attacks.”

Anonymous, Senior Director Information Security, Children’s Hospital

DECOY CAPABILITIES

DEVICE

Decoys that Mirror-Match Production Assets

SERVICES

Deceptive Decoy Services to Misdirect Attacks

APPLICATION

Deceptive Applications to Entice Attackers

Cisco Switches

Camera Streaming

Big Data

Cisco Routers

File Transfer

Database

Cisco Telephony

Print Server

Dock Apps

ICS/SCADA

Remote Access

Retail Web Portal

loT

Web Server

Swift

Medical loT

Point of Sale

DECOY CAPABILITIES

DEVICE

Decoys that Mirror-Match Production Assets

Cisco Switches

Cisco Routers

Cisco Telephony

ICS/SCADA

loT

Medical loT

Point of Sale

SERVICES

Deceptive Decoy Services to Misdirect Attacks

Camera Streaming

File Transfer

Print Server

Remote Access

Web Server

APPLICATION

Deceptive Applications to Entice Attackers

Big Data

Database

Dock Apps

Retail Web Portal

Swift