Deceptions Everywhere ®

Insights on threat and cyber risk trends, use cases for deception technology
and strategies for combatting targeted attacks

Cybersecurity 101: An Introduction to Cyber Deception Technology

Posted by the Illusive Networks team on Nov 4, 2015 9:55:00 AM


Deception technology is an outside-the-box cybersecurity approach that aims to turn the current paradigm on its head – from reactionary to proactive defense.

Traditional, signature-based security measures continue to fall prey to sophisticated zero-day attacks and advanced persistent threats, despite the fact that companies are spending upwards of $3 million per year on information security.

It’s time for organizations to get proactive, and use deception technology to enhance the way they architect a comprehensive security strategy.  

4 Things Every CISO Must Know About Deception Cybersecurity


1. Manipulating the One Thing Cyber Attackers Count On

Attackers have long been able to trust companies. They work on the fundamental assumption that the infrastructure data they see is real. Deception technology uses carefully designed lures to attract attackers during infiltration and instantly identify them.

2. Providing Instant Gratification

With firewalls and antivirus software, it can often take months to realize that a breach has occurred – and at times, these attacks go entirely unnoticed.

Deception technology triggers alerts the moment an attacker “trips the wire”. With the average cost of a data breach nearing $4 million, enterprise organizations can’t afford to wait until they’ve already been attacked to start handling the situation.

3. Going Beyond Digital Signatures

Digital signatures act as a fingerprint that identifies a digital threat; however, the rise of advanced persistent threats and zero-day attacks show that attackers are far too sophisticated to make the same mistakes twice.

According to a quote that appeared in National Cyber Security from Allen Harper, Chief Hacker at Tangible Security, “The cyber thug has worked to locate IP addresses and ports that appear to have the servers and services he can benefit from attacking.

He has worked to develop specific tools and approaches that routinely prove effective at breaking in and stealing data.”

< What's the difference between honeypots and deception tech? Click to find  out >

Deception technology turns the tables on the attackers behind the attack, not only by exposing them, but also by ensuring that their strengths become weaknesses.

4. Simplifying the Solution Stack

It’s hard to deny that networking equipment and software is growing more complicated. With the rise of software-defined networking, IT departments must deploy more in-band security appliances (firewalls and intrusion detection systems) to ensure protection.

However, these appliances often fail to keep attackers out, and can also interfere with network performance. Decision-makers must understand that deception technology eliminates this issue, seeing as deception lures are transparent to users and security staff, and only used by the attacker. 

By removing interaction with the security measure, this can help free up some valuable network resources.

Why Deception Technology, and Why Now?

The value of the cybersecurity market is expected to reach $170.21 billion by 2020. Yet, all of this spending is worthless if attackers still enjoy free rein over enterprise networks.

Tweet: In the US alone, companies experience an annual loss of $525 million due to cyber crimeIn the US alone, companies experience an annual loss of $525 million due to cyber crime. It’s clear that current cybersecurity methods aren’t working as well as companies might hope, and that a new approach is necessary.

Deception technology is an innovative “overlay” approach to cybersecurity that can change the way many organizations work to prevent data breaches, malicious code, and denial-of-service attacks.

Consider two major targets of cyber crime – credit card databases and intellectual property in file servers. It appears as if there’s a new data breach or cyber crime story in the headlines every few months – with companies such as Target and JP Morgan Chase proving to be just as vulnerable as anyone else.

Tweet: With deceptive technology in place, any organization can force attackers into a world of unreliable data that renders attacks uselessWith deception technology in place, any organization can force attackers into a world of unreliable data that renders attacks useless.

With real time forensics and reliable alerts, companies can start to understand the intentions of individual attackers and learn how to be more prepared in the future.

As high profile attacks continue to hit the news, it’s becoming more crucial than ever to consider a creative cybersecurity strategy.

Deception technology is a game-change that can make organizations of all sizes more proactive, leading to cost savings and overall greater protection.

Cyber War StrategyRecommended reading for you:

Topics: Cybersecurity, Introduction to cyber deception, Cybersecurity 101

Stay up to date!