Although not a new term, "honeypot" is a tactic being used more and more in our age of increased cyber crime. What does it entail?
When a hacker comes into your network, you can lead them into what they believe is accurate and real information and then set the trap. Attackers are reliant upon getting responses from points within an infrastructure in order to move things forward. With a fake environment they believe to be moving and making progress, however, are trapped in the end.
These tactics have also been used in military combat and strategy.
How can an iQSG client take advantage of this tactic? As read in Gartner's "Emerging Technology Analysis: Deception Techniques and Technologies Create Security Technology Business Opportunities" by analyst Lawrence Pingree These recommendations can be offered in support of leveraging this technology.
Examine how threat deception techniques can be leveraged to enhance your existing threat defense capabilities against advanced adversaries.
Consider whether integrating with existing threat deception providers can bring additional value to your current offerings.
Evaluate existing deception capabilities across the security market, and articulate them correctly to your product marketing managers to demonstrate the value of deceiving the attacker."
More information and strategic conversation can be offered by an iQSG Chief Architect. Join us for a live session hosted by Attivo networks and iQSG. The Attivo platform provides a comprehensive deception platform that in real-time detects inside-the-network intrusions in networks, public and private data centers, and specialized environments such as Industrial Control System (ICS) SCADA, Internet of Things (IoT), and Point of Sale (POS) environments.
Details on research and usage statistics can be found more fully in the article below. "Emerging Technology Analysis: Deception Techniques and Technologies Create Security Technology Business Opportunities".
Excerpts included from Gartner's "Emerging Technology Analysis: Deception Techniques and Technologies Create Security Technology Business Opportunities" FOUNDATIONAL Refreshed: 30 September 2016 | Published: 16 July 2015 ID: G00278434 Analyst(s): Lawrence Pingree