Knowing how attackers operate creates the opportunity to use deception to lure, detect and defend against external intruders, malicious insiders, and malware. Whether you work for a government agency, a large corporate company, a hospital or a college, every organization is different and that’s why it’s important to understand which deployment strategies are right for your environment, risk level, resources, and skills.
Read this e-book to learn about ten key considerations that can assist you in making your project a success including:
- The benefits of containment vs. detection
- Considering environment differences
- Understanding widespread deployment benefits
- Focusing on breadcrumb links to decoys for detection
- Understanding the depth of deception layers required
- Adaption and freshness cycles
- Determining risk appetite
- Understanding the impact on resources
- Using automation to reduce time and effort
- Implementing a detection and response strategy