DECEPTION
Confusing an attacker and / or their tools is an increasingly important weapon in a security team ’ s arsenal . Tricks and decoys nestled behind an organization ’ s firewall not only delay an attacker ’ s activities , they also aid in their fast detection and resolution . Good deception technologies will permeate many layers within the stack , from data to endpoint .
8
7ENDPOINT
DETECTION AND RESPONSE
Add effective endpoint detection and response technology to conventional preventative measures such as antivirus to spot odd behaviour and evidence of malicious intent . Investment in these technologies are ramping fast – Gartner reports it expects up to 80 % of large enterprises to have invested in it over the next couple of years .
27