Fortinet black logo

Administration Guide

Deception strategy components

Copy Link
Copy Doc ID 94250e1c-2251-11ed-9eba-fa163e15d75b:317406
Download PDF

Deception strategy components

Deployment of enterprise-scale deception includes the following components:

  • Medium interaction decoy and high interaction decoy that are deployed everywhere.
  • Customizable decoys to match infrastructure and applications.
  • Create and deploy lures to redirect attackers toward decoys.
  • Create and deploy lures with trackable misinformation.
  • Threat analysis capabilities.
  • Integration with existing security infrastructure for mitigation and remediation (Security Fabric and third-party).

Deception strategy components

Deployment of enterprise-scale deception includes the following components:

  • Medium interaction decoy and high interaction decoy that are deployed everywhere.
  • Customizable decoys to match infrastructure and applications.
  • Create and deploy lures to redirect attackers toward decoys.
  • Create and deploy lures with trackable misinformation.
  • Threat analysis capabilities.
  • Integration with existing security infrastructure for mitigation and remediation (Security Fabric and third-party).