DECEIVE, EXPOSE AND ELIMINATE THREATS BEFORE REAL DAMAGE OCCURS
Deception technology is unique in that it is the only zero false positive cyber attack early warning system. Helping with breach protection, the technology creates multiple traps on a network with decoys disguised as data assets that alert the organisation whenever they have been triggered.
Serving as an early warning system, FortiDeceptor enables companies to rapidly create fabricated deception networks through the automated deployment of deception VMs and decoys. Seamlessly integrating with existing infrastructures to trick attackers into revealing themselves and providing accurate detection of an attacker’s activity details and movement.
HOW FORTIDECEPTOR WORKS
FortiDeceptor creates multiple virtual machines across multiple segments of a network. The virtual machines are essentially advanced honeypots that can detect an attacker as soon as they interact with the machine’s exposed services.
Luring cyber-criminals away from valuable data and exposing their presence, without their knowledge, allows forensic analysis in real time to closely monitor patterns, activities, and techniques to discover the breached devices and vulnerabilities. The intelligence gathered from the attack can automatically be applied to in-line security controls to stop attacks before there is any significant damage.
In addition, Fortinet’s deception technology deploys tokens to the network’s actual endpoints – these Tokens are breadcrumbs which direct to the deception machines.
Key System Features
- Real-time blocking of attackers
- Actionable visibility
- Automated protection
- Ease of deployment
- Security infrastructure integration
- GUI driven threat map, uncovering threat campaigns
FORTIDECEPTOR OT SECURITY
FortiDeceptor is now available as an industrially hardened rugged appliance – the FortiDeceptor Rugged 100G – for harsh industrial environments:
- The system, both appliance and VM, also provides new OT/IoT/IT decoys to support diverse environments.
- To combat emerging threats and vulnerabilities, FortiDeceptor also now enables on-demand creation of deception decoys based on newly discovered vulnerabilities, or suspicious activity, providing automated, dynamic protection across OT/IoT/IT environments.
Get in Touch
To find out about the benefits of decoy & deception technology, you can get in touch with one of our trusted advisors.
You can also schedule a demonstration to see how FortiDeceptor works in action.
Please leave a few contact details or call us to speak with someone immediately.