Sertalink

/sales@sertalink.com  BE: +32(0)3/337.17.01.    LUX: +352(0)27/94.06.59.

Sertalink

Deception

Homepage/ Deception

FortiDeceptor

Deception-based Breach Protection
Deceive, Expose and Eliminate External and Internal Threats

FortiDeceptor: Deception-based Breach Protection Overview

In the evolving threat landscape, security leaders are concerned about maintaining business resiliency in the face of cyber threats including ransomware, 0-day attacks that target legacy systems, and lateral attacks. These threats don’t just affect IT networks, they can have an impact on interconnected OT networks as well. According to Verizon’s 2020 Data Breach Investigation Report, two-thirds of breaches found were from external actors; the remaining one-third involved internal actors. Reactive security solutions focus on protecting either external threats or internal threats, but not both.

Based on deception technology, FortiDeceptor complements an organization’s existing breach protection strategy. It is designed to deceive, expose en eliminate external and internal threats early in the attack kill chain before any significant damage occurs.

 

FortiDeceptor: Deception-based Breach Protection Product Details

Using FortiDeceptor, organizations can rapidly create a fake environment that simulates the real network and assets. Through the automatic deployment of decoys and tokens, the deception network seamlessly integrates with an existing IT/OT infrastructure to lure external and internal attackers into revealing themselves. FortiDeceptor can serve as an early warning system by detecting an attacker’s activity and the lateral movement of a broader threat campaign. The threat intelligence gathered from the attacker can be applied automatically to inline security controls to stop attacks before any real damage is done.

Features and Benefits

Simple Management

Centrally manage a distributed deployment of FortiDeceptor and intelligent discovery and automated deployment of pre-built or custom decoys

Actionable Visibility

GUI driven threat map quickly uncovers threat campaigns targeting your organization

Unified IT-OT breach protection

Lure attacks away from critical assets across both IT and OT environments

Automated Protection

Part of the Fortinet Security Fabric for integration with FortiGate, FortiNAC, FortiSOAR, and third-party solutions to provide real-time and severity-based blocking

Improved Security Posture

Goes beyond malware protection by focusing on the threat actors

X