Technology Magazine August 2017 | Page 27

DECEPTION

Confusing an attacker and / or their tools is an increasingly important weapon in a security team ’ s arsenal . Tricks and decoys nestled behind an organization ’ s firewall not only delay an attacker ’ s activities , they also aid in their fast detection and resolution . Good deception technologies will permeate many layers within the stack , from data to endpoint .

8

7ENDPOINT

DETECTION AND RESPONSE

Add effective endpoint detection and response technology to conventional preventative measures such as antivirus to spot odd behaviour and evidence of malicious intent . Investment in these technologies are ramping fast – Gartner reports it expects up to 80 % of large enterprises to have invested in it over the next couple of years .
27