Fortinet black logo

Administration Guide

Deception strategy components

Copy Link
Copy Doc ID 63cab9f6-5858-11ec-bdf2-fa163e15d75b:317406
Download PDF

Deception strategy components

Deployment of enterprise-scale deception includes the following components:

  • Medium interaction decoy and high interaction decoy that are deployed everywhere.
  • Customizable decoys to match infrastructure and applications.
  • Create and deploy lures to redirect attackers toward traps.
  • Create and deploy lures with trackable misinformation.
  • Threat analysis capabilities.
  • Integration with existing security infrastructure for mitigation and remediation (Security Fabric and third-party).

Deception strategy components

Deployment of enterprise-scale deception includes the following components:

  • Medium interaction decoy and high interaction decoy that are deployed everywhere.
  • Customizable decoys to match infrastructure and applications.
  • Create and deploy lures to redirect attackers toward traps.
  • Create and deploy lures with trackable misinformation.
  • Threat analysis capabilities.
  • Integration with existing security infrastructure for mitigation and remediation (Security Fabric and third-party).