CybersecurityIdentity & Access

Deception Technology

Overview

Security solutions that deploy decoy assets such as fake servers, credentials, and data to detect, misdirect, and analyse attackers who have breached perimeter defences.

More in Cybersecurity