home_banner `

Content Icon

Deception Technologies: A Market Overview

December 4, 2018 | Ask-An-Expert | Threat Detection and Hunt Teaming | By Dave Shackleford, IANS Faculty

The market for deception technologies is heating up. In this Ask-an-Expert written response, IANS Faculty Dave Shackleford explains how the tools work and provides an overview of the top players in the space.


Please Login to continue or Become a Client

Related Research

Managing the 2019 Threat Landscape

In this webinar, IANS Research Director Bill Brenner and IANS Faculty Joshua Marpet look at what to expect for threats in 2019 and, most importantly, how best to prepare for those threats. They also discuss what they see as the coming advances in security technology and process, and how get ahead of the curve.

Industrial Control Systems: Top Threat Vectors

Security professionals say the top threat vectors to industrial control systems (ICS) that most concern them are external threats (22%), devices added to the network (19%) and internal threats or accidents (14%).

Banking/Financial Services Information Security

This collection of slides includes third-party data on all things information security within the banking and financial services sector. 

Deception Technology Use Cases

Deception technologies are gaining traction in the enterprise as a means of detecting and responding to incidents more rapidly and effectively. These five use cases can help get you started.

We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.