Save or Share this Report

For Security & Risk Professionals

Honeypots 2.0: Deception Technology Lures Cybercriminals Into A Trap

Hollywood Isn't The Only Industry Banking On Sequels

July 18, 2017

Authors

Why Read This Report

Security and risk (S&R) professionals can leverage deception technologies that mimic real production applications and systems in an attempt to lure attackers into an intrusion. The concept isn't new, but current technologies are gaining interest again due to a wave of innovation and venture capital investment. In this report, we explain the benefits and limitations of deception technology and profile and explain when it makes sense to invest in it (and when it doesn't).

Get Access

Already a Client?

Log in to read this document.

Become a Forrester Client

Customers are the new market-makers, reshaping industries and changing how businesses compete and win. Success depends on how well and how fast you respond. Forrester Research gives you insights and frameworks aligned to your role to shorten the time between a great idea and a great outcome, helping your teams win in the age of the customer. Contact us to learn more.

Purchase Report

This report is available for individual purchase ($499 USD).

Purchase

Table of Contents

  • Never Tell A Lie, Unless It's To An Attacker
  • Deception Technology Uses Fake Assets To Detect Attackers
  • Deception Tech Is Innovative, But It Doesn't Replace The Fundamentals
  • Recommendations

  • Plan Your Lies In Advance
  • Supplemental Material
  • Related Research Documents

Recommended Research