skip to main content
Close Icon We use cookies to improve your website experience.  To learn about our use of cookies and how you can manage your cookie settings, please see our Cookie Policy.  By continuing to use the website, you consent to our use of cookies.
Global Search Configuration

Introduction

Most organizations accept that the malicious penetration of their networks by human attackers and/or automated malware is inevitable.

Highlights

  • Activity associated with decoys, which are of no interest to genuine users, can be assumed to be malicious, so there should be no false positives.

Features and Benefits

  • Describes how deception technology works.
  • Explains the different approaches to deception.

Key questions answered

  • What is a low-interaction decoy?
  • Does deception tech help with detection?

Table of contents

Ovum view

  • The use of deception to fool attackers in cyberspace
  • The inevitability of cyberattacks
  • The value of deception technology
  • The emerging market for deception

Appendix

  • Further reading
  • Author

Recommended Articles

;

Have any questions? Speak to a Specialist

Europe, Middle East & Africa team: +44 7771 980316


Asia-Pacific team: +61 (0)3 960 16700

US team: +1 212-652-5335

Email us at ClientServices@ovum.com

You can also contact your named/allocated Client Services Executive using their direct dial.
PR enquiries - Email us at pr@ovum.com

Contact marketing - 
marketingdepartment@ovum.com

Already an Ovum client? Login to the Knowledge Center now