EN

Main page

Services

Products

Company

Industries

DECEPTION TECHNOLOGIES

Deception technologies are a collection of techniques for imitating IT infrastructure and misinforming cybercriminals, used to detect and slow down the progress of malicious attacks, and ultimately allow attacks to be stopped before they cause significant damage

ADVANTAGES OF DECEPTION TECHNOLOGY

APT-attacks

ideal against o-day vulnerabilities and unidentified threats

High accuracy

no false positives

High compatibility

does not add dependencies

Ease of operation

easy to implement, use, scale

DECEPTION TECHNOLOGIES

An organization's infrastructure begins to consist of two layers: real and fake. Moreover, the fake layer looks much more attractive and tempting to the attacker. Deployed traps and decoys "take the hit", entice the attacker into the network of fictitious infrastructure, thereby gaining time to take countermeasures, which leads to the safety of real assets.

CONNECTION DIAGRAM

ADVANTAGES OVER THE DECISIONS OF COMPETITORS

Russian-language support 8/5

Support for other foreign solutions in our country is carried out only by integrators, but we offer an immediate response to your requests, connecting, if necessary, a team of developers

Generation of individual data

Taking into account the characteristic features of your company, such as real domain names, the format of logins and email boxes. Also with a choice of password complexity ― from complex regular expressions to dictionary expressions from popular password sheets

Simulating interaction with traps

Trapped competitors have no network communication, allowing an attacker to passively

Interested in a product?

Enter your contacts and we will contact you to clarify the details

Your name

Phone number

Email

Comment (optional)

2014 - 2021 © Бастион | Все права защищены