Fortinet black logo

Administration Guide

Deception strategy components

Copy Link
Copy Doc ID 5e5f427d-b811-11eb-92d0-00505692583a:317406
Download PDF

Deception strategy components

Deployment of enterprise-scale deception includes the following components:

  • Medium interaction decoy and high interaction decoy that are deployed everywhere.
  • Customizable decoys to match infrastructure and applications.
  • Create and deploy lures to redirect attackers toward traps.
  • Create and deploy lures with trackable misinformation.
  • Threat analysis capabilities.
  • Integration with existing security infrastructure for mitigation and remediation (Security Fabric and third-party).

Deception strategy components

Deployment of enterprise-scale deception includes the following components:

  • Medium interaction decoy and high interaction decoy that are deployed everywhere.
  • Customizable decoys to match infrastructure and applications.
  • Create and deploy lures to redirect attackers toward traps.
  • Create and deploy lures with trackable misinformation.
  • Threat analysis capabilities.
  • Integration with existing security infrastructure for mitigation and remediation (Security Fabric and third-party).