Benchmarking Deception Solutions

  • With the evolving threat landscape, breaches are becoming increasingly common. As per Ponemon Institute, in 2017, the average time required to detect a breach was 191 days and the average time required to contain a breach was 66 days. These time frames can have a significant impact on businesses relying on technology for their continued operations. Deception as a strategy has always been a critical element for detecting threats and adversary behavior. Honeypots have been used as a deception mechanism for over a decade, both by organizations and security vendors, to research attack tactics, techniques, and procedures and provide threat intelligence. This 20 page comprehensive guide will help you to evaluate and compare deception solutions.


This Guide Includes:

  • Deception Technology Use Cases
  • Key Evaluation Parameters
  • Evaluation Checklist to evaluate and compare different deception solutions

E-mail me when people leave their comments –

You need to be a member of CISO Platform to add comments!

Join CISO Platform

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)