Deception technology

With deception technology, the environment is populated with decoys: fake endpoints, files, services, databases, users, computers, and other resources that mimic assets. The intent is to lure adversaries away from legitimate targets and detect intruders in the early stages of an attack, both key to minimising damage.

Framing alternatives