Page 17 - Cyber Warnings
P. 17
Comprehensive solutions will be able to detect threats in user networks, data centers, cloud,
industrial control system (ICS- SCADA) and Internet of Things (IoT) environments.
These platforms will turn the entire network into a trap and once the attacker is engaged, they
can also safely analyze attacks to attain the forensic data required to quarantine an infected
device and update prevention systems to block against current and future attacks.
Who uses deception technology?
Every organization that is concerned with protecting their most critical assets (company data
and intellectual property (IP), Personally Identifiable Information (PII), critical infrastructure, etc.)
should be looking at deception as part of their security infrastructure.
Given the number of breaches that are occurring on a daily basis, today’s secure posture
requires an “assumed breached” approach that includes a mix of prevention and detection
solutions.
Deception is becoming widely adopted by Fortune and midsize organizations across financial,
healthcare, high-tech, retail, entertainment, energy, government, and many other verticals as
organizations seek an efficient solution for inside the network threat visibility as an augment to
their prevention systems.
Why is deception technology important?
Prevention alone has proven insufficient to stop attackers from getting into a network. The
reality is that they can’t be effective with 12 new attack strains being produced per minute, two
out of three attacks come from stolen credentials, 43 percent of data loss coming from insider
and 3rd party threat actors and security operations center (SOC) teams are expected to keep up
with an average of 14 alerts per hour…
An attacker on average, go 7+ months before organizations even know they have been
breached and by then it is too late.
Organizations are realizing now more than ever that that inside-the-network threat detection is a
must and that deception offers the most efficient and cost effective way to quickly detect all
types of cyber threats. Paul Proctor, Gartner Analyst, has published a paper titled “Shift
Cybersecurity Investment to Detection and Response,” which serves as a good reference to
why detection is needed in addition to prevention solutions.
|How does deception technology work?
It is important to understand that deception is not another layer of prevention. It is also different
than Intrusion Detection Systems (IDS/IPS) systems and big data monitoring, which although
they are methods for detecting attacks, are challenged by reliability and the need for highly
17 Cyber Warnings E-Magazine – April 2016 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide