|By Doron Kolton||
|December 3, 2016 08:00 AM EST||
Top 5 Reasons Why Security Teams Love Intelligent Deception
Cyberattacks are relentless. The pace of attacks shows no sign of slowing, and organizations understand that 100 percent prevention of attacks is not possible. Traditional prevention and detection techniques are falling short, and security professionals are scrambling for new paradigms that can more effectively detect attacks and mitigate the growing levels of damage.
In this climate of confusion, deception-based solutions offer a viable and proven way to stop attackers in their tracks. Why? Because instead of sitting back and waiting to be the victim, detection technologies let organizations be proactive and take the attack to the attacker. We've compiled a list of top five reasons why more security teams are opting for deception:
1. Malware Agnostic
Today's cyber defenses are centered around prevention. Yet next-generation firewalls, DLPs and antivirus solutions all rely on signatures and reputation to accomplish (or not accomplish) their task. This means that if they don't recognize the threat, they can't stop it. This is why we see so many data breaches at companies that have invested heavily in security - because threats are always changing and organizations are being hit with new attacks never seen before.
Deception, on the other hand, is a defense paradigm that's completely attack-agnostic. There's no need to define which specifically "irregular" attack is underway. Operating under the assumption that attackers have already breached the network, deception solutions set traps, lures and fake data to detect and stop human and machine attackers.
With intelligent deception technologies, the malicious nature of a particular software or user is determined when they trigger a trap. Once an intruder is detected, the deception layer sends an alert to the security team while profiling the threat. Using this approach, organizations can significantly shorten breach-to-resolution time and get a higher ROI dealing with accurate incidents.
2. Attack Interference
Intelligent deception not only lures attackers to decoys, it also serves to slow down attacks and keep the attackers engaged with decoy systems instead of roaming and causing harm to the network. Decoys engage attackers and keep them occupied in a number of ways, such as:
- Adjusting the decoy's TCP stream as necessary to enable a slower or faster interaction
- Allowing password-guessing in order to continue engaging the attacker. For instance, a decoy can be preset to decline the first six attempts, and allow the seventh to come through, regardless of the string that was typed in.
- Feeding the attacker large files even when those are not requested by the attacker.
3. Enriched Threat Intelligence
The deception approach allows security teams to take the initiative - proactively developing intelligence that helps find the attacker's communication channels, understand how the connection was established, find out what protocols were used, and more. Some of the more advanced deception solutions employ traffic analysis engines in order to both place their traps strategically as well as to gather additional information about network threats.
By combining data from decoys, traps, traffic analysis and other active detection tools, deception platforms can feed and enrich SIEM/SOC systems to help organizations build comprehensive threat maps using real data in real time. The threat intelligence and visibility generated by drawing the attacker in rather than simply repulsing the attack enables an understanding of the attacker's goals - preventing not only this attack, but also future attacks. This is how organizations can take the attack to the attacker.
4. Minimizes False Positives
Alert fatigue and frustration from tedious analysis of false-positive are two of the biggest challenges facing cyber defenders. The former can lead to a "boy who cried wolf" mentality, which puts the organization at risk when security teams start ignoring alarms and can't begin to address the wave of alerts. The latter creates frustration because to be classified as false positives, numerous events demand considerable analysis and collection of data from a wider pool of sources for corroboration.
Deception solutions offer relief from this labor-intensive paradigm. Decoys trigger a low number of false positives because legitimate traffic shouldn't go near them in the first place. False positives are further reduced via higher levels of interaction between the decoy and the attacker and by correlating findings with other sensors in the network. Furthermore, advanced intelligent deception platforms that have integrated traffic analysis capabilities run internal correlation of data from both the deception and monitoring layers to ensure even higher alert accuracy. With far fewer false alarms, the security team can avoid configuration and management distractions and concentrate on real incidents.
5. Easy to Deploy & Manage
Current deception solutions are light years more advanced than the old, clunky honeypots of 10 and 20 years ago. Deploying deception is simple and fast. Intelligent deception is based on decoys and mini-traps - otherwise known as breadcrumbs or lures. These are placed on endpoints and servers and lead back to the decoys. In advanced deception-based solutions, deception components are deployed using point-and-click configuration, which largely automates the rollout of phantom decoys and networks. Deception solutions that have integrated traffic analysis capabilities use those in order to strategically place traps and decoys where they can be most effective - and dynamically adjust the deception layer as the network and threat environments evolve. Coupled with deception's accuracy and low (often no) false positives, this ease of configuration and management allows organizations to benefit from the technology without having to increase headcount.
The Bottom Line
The rising tide of cyber threats and the failure of traditional security paradigms to address them have created a perfect storm of cyberattacks. Deception is one of the few solutions that can break this cycle in an effective and cost-effective way - shutting down attacks before they cause damage, and letting network security professionals go on the offensive against attackers.
"We build IoT infrastructure products - when you have to integrate different devices, different systems and cloud you have to build an application to do that but we eliminate the need to build an application. Our products can integrate any device, any system, any cloud regardless of protocol," explained Peter Jung, Chief Product Officer at Pulzze Systems, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 4, 2016 02:15 AM EST Reads: 839
When it comes to cloud computing, the ability to turn massive amounts of compute cores on and off on demand sounds attractive to IT staff, who need to manage peaks and valleys in user activity. With cloud bursting, the majority of the data can stay on premises while tapping into compute from public cloud providers, reducing risk and minimizing need to move large files. In his session at 18th Cloud Expo, Scott Jeschonek, Director of Product Management at Avere Systems, discussed the IT and busin...
Dec. 4, 2016 02:00 AM EST Reads: 3,779
Between 2005 and 2020, data volumes will grow by a factor of 300 – enough data to stack CDs from the earth to the moon 162 times. This has come to be known as the ‘big data’ phenomenon. Unfortunately, traditional approaches to handling, storing and analyzing data aren’t adequate at this scale: they’re too costly, slow and physically cumbersome to keep up. Fortunately, in response a new breed of technology has emerged that is cheaper, faster and more scalable. Yet, in meeting these new needs they...
Dec. 4, 2016 12:30 AM EST Reads: 1,779
The cloud promises new levels of agility and cost-savings for Big Data, data warehousing and analytics. But it’s challenging to understand all the options – from IaaS and PaaS to newer services like HaaS (Hadoop as a Service) and BDaaS (Big Data as a Service). In her session at @BigDataExpo at @ThingsExpo, Hannah Smalltree, a director at Cazena, provided an educational overview of emerging “as-a-service” options for Big Data in the cloud. This is critical background for IT and data professionals...
Dec. 3, 2016 11:00 PM EST Reads: 4,141
"Once customers get a year into their IoT deployments, they start to realize that they may have been shortsighted in the ways they built out their deployment and the key thing I see a lot of people looking at is - how can I take equipment data, pull it back in an IoT solution and show it in a dashboard," stated Dave McCarthy, Director of Products at Bsquare Corporation, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 3, 2016 11:00 PM EST Reads: 952
Fact is, enterprises have significant legacy voice infrastructure that’s costly to replace with pure IP solutions. How can we bring this analog infrastructure into our shiny new cloud applications? There are proven methods to bind both legacy voice applications and traditional PSTN audio into cloud-based applications and services at a carrier scale. Some of the most successful implementations leverage WebRTC, WebSockets, SIP and other open source technologies. In his session at @ThingsExpo, Da...
Dec. 3, 2016 09:30 PM EST Reads: 1,601
@DevOpsSummit taking place June 6-8, 2017 at Javits Center, New York City, is co-located with the 20th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. @DevOpsSummit at Cloud Expo New York Call for Papers is now open.
Dec. 3, 2016 09:30 PM EST Reads: 1,767
The cloud competition for database hosts is fierce. How do you evaluate a cloud provider for your database platform? In his session at 18th Cloud Expo, Chris Presley, a Solutions Architect at Pythian, gave users a checklist of considerations when choosing a provider. Chris Presley is a Solutions Architect at Pythian. He loves order – making him a premier Microsoft SQL Server expert. Not only has he programmed and administered SQL Server, but he has also shared his expertise and passion with b...
Dec. 3, 2016 08:00 PM EST Reads: 3,956
In his session at 19th Cloud Expo, Claude Remillard, Principal Program Manager in Developer Division at Microsoft, contrasted how his team used config as code and immutable patterns for continuous delivery of microservices and apps to the cloud. He showed how the immutable patterns helps developers do away with most of the complexity of config as code-enabling scenarios such as rollback, zero downtime upgrades with far greater simplicity. He also demoed building immutable pipelines in the cloud ...
Dec. 3, 2016 08:00 PM EST Reads: 1,746
As data explodes in quantity, importance and from new sources, the need for managing and protecting data residing across physical, virtual, and cloud environments grow with it. Managing data includes protecting it, indexing and classifying it for true, long-term management, compliance and E-Discovery. Commvault can ensure this with a single pane of glass solution – whether in a private cloud, a Service Provider delivered public cloud or a hybrid cloud environment – across the heterogeneous enter...
Dec. 3, 2016 06:15 PM EST Reads: 1,515
"IoT is going to be a huge industry with a lot of value for end users, for industries, for consumers, for manufacturers. How can we use cloud to effectively manage IoT applications," stated Ian Khan, Innovation & Marketing Manager at Solgeniakhela, in this SYS-CON.tv interview at @ThingsExpo, held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 3, 2016 05:30 PM EST Reads: 4,047
Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more business becomes digital the more stakeholders are interested in this data including how it relates to business. Some of these people have never used a monitoring tool before. They have a question on their mind like “How is my application doing” but no id...
Dec. 3, 2016 05:15 PM EST Reads: 2,139
@GonzalezCarmen has been ranked the Number One Influencer and @ThingsExpo has been named the Number One Brand in the “M2M 2016: Top 100 Influencers and Brands” by Onalytica. Onalytica analyzed tweets over the last 6 months mentioning the keywords M2M OR “Machine to Machine.” They then identified the top 100 most influential brands and individuals leading the discussion on Twitter.
Dec. 3, 2016 05:15 PM EST Reads: 2,004
In IT, we sometimes coin terms for things before we know exactly what they are and how they’ll be used. The resulting terms may capture a common set of aspirations and goals – as “cloud” did broadly for on-demand, self-service, and flexible computing. But such a term can also lump together diverse and even competing practices, technologies, and priorities to the point where important distinctions are glossed over and lost.
Dec. 3, 2016 04:30 PM EST Reads: 1,477
Predictive analytics tools monitor, report, and troubleshoot in order to make proactive decisions about the health, performance, and utilization of storage. Most enterprises combine cloud and on-premise storage, resulting in blended environments of physical, virtual, cloud, and other platforms, which justifies more sophisticated storage analytics. In his session at 18th Cloud Expo, Peter McCallum, Vice President of Datacenter Solutions at FalconStor, discussed using predictive analytics to mon...
Dec. 3, 2016 04:00 PM EST Reads: 4,864