The evidence is in and the old saw about building an impenetrable barrier around the corporate network has been debunked. If bad guys want to get in, they will. Today, the focus is making sure that they can’t get anything of value off the network. This eBook looks at today’s best practices for making the attackers’ efforts unproductive. We’ll look at various approaches ranging from traditional honeypots and data loss prevention tools to intrusion deception and the Star Trek-like version of a holodeck where attackers can live in a virtual environment that doesn’t really exist.