FortiDeceptor
Deception-based Breach Protection
Deceive, Expose and Eliminate External and Internal Threats

FortiDeceptor: Deception-based Breach Protection Overview
According to Verizon’s 2018 Data Breach Investigation Report, two-thirds of breaches found were from external actors while the remaining one-third involved internal actors. Unfortunately, today’s reactive security solutions are narrowly focused in either protecting external or internal threats but not both.
FortiDeceptor is based on deception-based technology that complements an organization’s existing breach protection strategy, designed to deceive, expose and eliminate attacks originating from either external or internal sources before any real damage occurs.
FortiDeceptor: Deception-based Breach Protection News
-
2020年11月17日FortiDeceptor v3.2 ReleaseFortiDeceptor provides intelligent provisioning and auto-deployment of decoys and lures, and supports deployment in air-gapped networks. For more information, please review the latest release notes.
-
2020年9月3日Addressing the Security Risks of Digital Transformation on IoT and OT With DeceptionDeception technology extends protection to OT Infrastructure.
-
2020年6月1日FortiDeceptor v3.1 ReleaseFortiDeceptor offers new decoy OS options and expands new decoy services. For more information, please review the latest release notes.
-
2019年4月9日Fortinet Expands its Security Fabric to Advance The Third Generation of Cybersecurity: Security-Driven NetworkingLatest Release of FortiOS Delivers Over 300 New Innovations Across the Fortinet Security Fabric for Protection from IoT to Edge, Network Core and to Multi-Clouds.
-
2019年4月9日Leveraging Deception for Breach ProtectionFortiDeceptor levels the playing field by automating the creation of dynamic decoys that are dispersed throughout the IT environment. Because attackers are unable to determine which assets are fake and which are real, their time advantage is reduced or eliminated altogether.
FortiDeceptor: Deception-based Breach Protection Product Details
FortiDeceptor, a Fabric-enabled deception approach allows organizations to rapidly create a fabricated deception network through intelligent provision and automatic deployment of decoys and lures that seamlessly integrate with an existing IT/OT infrastructure to lure attackers into revealing themselves.
Features and Benefits
Actionable Visibility
GUI driven threat map quickly uncovers threat campaigns targeting your organization
Automated Protection
Security Fabric integration with FortiGate provides real-time and severity-based blocking of attackers before real damage occurs
Deployment Ease
Centrally manage and automate the deployment of pre-built or custom decoys and lures
Unified IT-OT breach protection
Redirect attacks across both IT and OT critical assets
Building a Cybersecurity Workforce
Advanced training for security professionals, technical training for IT professionals, and awareness training for teleworkers.
學到更多FortiDeceptor Models and Specifications
FortiDeceptor offers both hardware and virtual appliance that allows flexibility for any organization to deploy in the campus and into the cloud.
Hardware Appliances
Form Factor |
1 RU |
Max Decoys |
16 |
港口 |
4 x GbE (RJ45), 4 x GbE (SFP) |
RAID level |
0/1 |
Power Supply Unit |
Dual PSU optional |
Virtual Machines
The virtual appliance of FortiDeceptor can be deployed on VMware and KVM platforms.
Max Decoys |
16 |
港口 |
6 virtual network interfaces |
Resources
Solution Guides
Webinars and Videos
Fuse Community
FortiGuard Security Services included in FortiDeceptor's ARAE engine
FortiDeceptor Anti-Reconnaissance and Anti-Exploit Service (ARAE) correlates attacker activities and integrates contextual intelligence through FortiGuard services mentioned below, resulting in single pane timeline-based threat campaign.
FortiDeceptor Demo
Today's targeted attacks can originate from both external or internal to an organization. Advanced threat deception is key to providing early detection and response before an attack is allowed to complete its full lifecycle. This fully functional FortiDeceptor demo provides users the experience to centrally manage decoys and lures, with actionable visibility to threat campaigns, and the ability to easily integrate with FortiGates to block these attacks.
FAQs
Below are answers to common questions regarding FortiDeceptor and related services:
How does FortiDeceptor work?
Decoys and lures are deployed to simulate real endpoints and servers with services, data and applications. Additionally, tokens can be embedded to real endpoints to redirect attacks to the decoys. Once a threat actor logs into a decoy, all activities are captured and the security administrator receives an alert directly or via Security Fabric integration with FortiSIEM, FortiAnalyzer including 3rd party SIEM for alerts and reporting. The security team can perform a full investigation, followed with either manual remediation or allow FortiDeceptor to perform automated mitigation such as device quarantine via Security Fabric integration with FortiGate.
What Decoy OS does FortiDeceptor support?
Currently, FortiDeceptor supports Windows (pre-built/custom), Linux, and SCADA.
Does FortiDeceptor fit my security infrastructure?
FortiDeceptor is offered as an appliance and VM form-factor that offers a range of deployment options.
How fast can FortiDeceptor be up and running?
Security operators can leverage built-in Deception OSes (Windows, Linux, and SCADA) to automate the deployment of decoys and lures on Day-1. Optionally, custom Windows OS decoys can also be deployed.
How do I test drive FortiDeceptor?
A self-driven FortiDeceptor demo can be found here. You may also request a live FortiDeceptor demo by contacting us here.