According to Verizon’s 2018 Data Breach Investigation Report, two-thirds of breaches found were from external actors while the remaining one-third involved internal actors. Unfortunately, today’s reactive security solutions are narrowly focused in either protecting external or internal threats but not both.
FortiDeceptor is based on deception-based technology that complements an organization’s existing breach protection strategy, designed to deceive, expose and eliminate attacks originating from either external or internal sources before any real damage occurs.
Apr 9, 2019Fortinet Expands its Security Fabric to Advance The Third Generation of Cybersecurity: Security-Driven NetworkingLatest Release of FortiOS Delivers Over 300 New Innovations Across the Fortinet Security Fabric for Protection from IoT to Edge, Network Core and to Multi-Clouds
Apr 9, 2019Leveraging Deception for Breach ProtectionFortiDeceptor levels the playing field by automating the creation of dynamic decoys that are dispersed throughout the IT environment. Because attackers are unable to determine which assets are fake and which are real, their time advantage is reduced or eliminated altogether.
FortiDeceptor Product Details
FortiDeceptor allows organizations to rapidly create a fabricated deception network through the automatic deployment of deception VMs and decoys that seamlessly integrate with an existing infrastructure to lure attackers into revealing themselves. FortiDeceptor helps serve as an early warning system by providing accurate detection that correlates an attacker’s activity details and lateral movement that feeds up to a broader threat campaign. Threat intelligence gathered from the attacker can be applied automatically to inline security controls to stop attacks before any real damage is done.
Features and Benefits
GUI driven threat map quickly uncovers threat campaigns targeting your organization
Security infrastructure integration provides real-time blocking of attackers before real damage occurs
Centrally manage and automate the deployment of deception VMs and decoys
FortiDeceptor Models and Specifications
FortiDeceptor offers both hardware and virtual appliance that allows flexibility for any organization to deploy in the campus and into the cloud.
The virtual versions of FortiDeceptor can be deployed in VMware and KVM platforms.
FortiGuard Security Services for FortiGuard Service Bundles
FortiGuard IPS 透過偵測威脅並在威脅侵入到網路裝置前進行封鎖，以此抵禦最新的網路入侵。
Today's targeted attacks can originate from both external or internal to an organization. Advanced threat deception is key to providing early detection and response before an attack is allowed to complete its full lifecycle. This fully functional FortiDeceptor demo provides users the experience to centrally manage deception VMs and decoys, with actionable visibility to threat campaigns, and the ability to easily integrate with FortiGates to block these attacks.Access the demo
How does FortiDeceptor work?
Deception VMs and decoys are deployed to simulate real endpoints and servers with services, data and applications. Once a threat actor logs into a deception VM instance, all activities are captured and the security administrator receives an alert. The security team can perform a full investigation, followed with either manual remediation or allow FortiDeceptor to perform automated mitigation.
What deception OS does FortiDeceptor support?
Currently, FortiDeceptor supports Windows and Linux OS.
How does FortiDeceptor fit my security infrastructure?
FortiDeceptor is offered as an appliance and VM that meets a wide range of requirements supporting campus to cloud deployments.
How fast can FortiDeceptor be up and running?
Security operators can leverage default VMs to automate the deployment of deception VMs and decoys on Day-1.
How does FortiDeceptor integrate with Fortinet Security Fabric?
FortiDeceptor natively integrates with FortiGates to automatically quarantine the external or internal attacker.
How do I test drive FortiDeceptor?