FAQ #5 - I already have Technology-X, why do I need deception?
There are many technologies available to detect security breaches; IDS, IPS, SEIM, EDR, XDR, DLP, AV, etc. Many of these technologies have been around for years or even decades. Even with these technologies, the Ponemon Institute Cost of a Data Breach study shows it takes organizations an average of 287 days to detect and respond to breaches.
It is apparent that traditional detection technologies can be evaded or avoided by attackers. Cyber deception takes a different approach when it comes to attack detection than most traditional security controls. Any interaction with a deceptive resource results in detection.
It is because cyber deception approaches attack detection is such a different way that it should be considered a necessary component of an overall security program.
For more information about anything Cyber Deception - visit us at?www.CyberTrap.com