Honeypots are deception technology’s earliest ancestor. IT security researchers started using them in the 1990s to deceive malicious actors who had made it onto the network by interacting with a false system. In this way, honeypots could gather intelligence on and assess the behavior of these malicious actors. They were not created for threat detection.

Security tools have progressed a great deal in the years since honeypots were created and deception technology has evolved considerably. The technology has moved beyond honeypots to next-generation distributed deception that surrounds the attacker with realistic, false data, destroying their ability to move laterally. This delivers immense value to organizations globally across a variety of use cases. Here are five benefits deception technology offers:

  1. Reduce the noise in the SOC.

Please register to continue.

Already registered? Log in.

Once you register, you'll receive:

  • News analysis

    The context and insight you need to stay abreast of the most important developments in cybersecurity. CISO and practitioner perspectives; strategy and tactics; solutions and innovation; policy and regulation.

  • Archives

    Unlimited access to nearly 20 years of SC Media industry analysis and news-you-can-use.

  • Daily Newswire

    SC Media’s essential morning briefing for cybersecurity professionals.

  • Learning Express

    One-click access to our extensive program of virtual events, with convenient calendar reminders and ability to earn CISSP credits.