DeceptionGrid —DeceptionGrid is a full suite of deception techniques, including the automated deception
Tokens (lures) and medium and high-interaction Traps (decoys). It baits attackers by deploying camouflaged Traps and Tokens among your actual IT resources. Our Traps appear identical in every way to your real operational IT assets and your connected Internet-of-things (IoT) devices. Deception in Depth takes the illusion a step further, engaging sophisticated attackers by maintaining a facade of convincing network traffic among our Traps.
Deception Tokens
Deception Tokens (lures) appear as ordinary files, scripts and configurations, are embedded within real IT assets to bait and divert attackers away from real high-value assets and into the traps.
Active Traps
Active Traps create a stream of false network traffic between deployed Traps to confuse and divert attackers that monitor the network traffic.
Emulated Traps
Our patented emulated traps can be deployed at the largest enterprise-scale through automation. You can select from a wide variety of servers, databases, workstations, switches, routers, and Traps tailor-made to your organization’s native environment. After a Trap is interacted with and the cyber-attack is thwarted, the Trap will change its shape and location, so the attacker will never learn if something is a Trap or a real asset.
Hundreds of New Industry Templates
The DeceptionNet Community now offers hundreds of new industry templates (updated regularly) that are available for your use. In addition, our patented medium interaction traps also include expanded templates for specialized devices based on specific industries. These templates include, ATM and SWIFT assets for financial services, Point of Sale (PoS) devices for retail, as well as devices for medical, manufacturing and many more. This allows you to determine if attackers are targeting your specialized devices that are often vulnerable to attack.
High Interaction (Full Operating System) Traps
DeceptionGrid enables the provision of full operating system (FullOS) Traps. Our medium interaction Traps automatically extend engaged attackers through our smart deception to our FullOS Traps for the deepest attacker diversion and engagement. FullOS Traps also enable you to clone existing assets – you can completely replicate actual production servers to further deceive attackers.
Write to us and we will answer you as soon as possible.
Want a pilot project? Check the appropriate box.