Fortinet Document Library

Version:

Version:

Version:

Version:

Version:

Version:


Table of Contents

Administration Guide

Deception strategy components

Deployment of enterprise-scale deception includes the following components:

  • Medium interaction decoy and high interaction decoy that are deployed everywhere.
  • Customizable decoys to match infrastructure and applications.
  • Create and deploy lures to redirect attackers toward traps.
  • Create and deploy lures with trackable misinformation.
  • Threat analysis capabilities.
  • Integration with existing security infrastructure for mitigation and remediation (Security Fabric and third-party).

Deception strategy components

Deployment of enterprise-scale deception includes the following components:

  • Medium interaction decoy and high interaction decoy that are deployed everywhere.
  • Customizable decoys to match infrastructure and applications.
  • Create and deploy lures to redirect attackers toward traps.
  • Create and deploy lures with trackable misinformation.
  • Threat analysis capabilities.
  • Integration with existing security infrastructure for mitigation and remediation (Security Fabric and third-party).