Skip to main content
search

Ready to Talk?

Are you looking for FortiDeceptor pricing information, license renewals, technical support, a managed EDR or a fully managed cyber security service?

Fortinet integrated security solutions

FortiDeceptor

How it works

FortiDeceptor creates multiple virtual machines in across multiple segments of your network. The virtual machines are essentially advanced honeypots that can detect an attacker as soon as they interact with the machine’s exposed services. In addition, Fortinet’s deception technology deploys tokens to the network’s actual endpoints – these Tokens are breadcrumbs which direct to the deception machines.

DECEIVE, EXPOSE & ELIMINATE ATTACKS

  • GUI driven threat map quickly uncovers threat campaigns targeting your organisation
  • Security infrastructure integration provides real-time blocking of attackers
  • Deploy Fortinet and third-party services as virtual network functions

AUTOMATIC DETECTION AND RESPONSE TO BOTH EXTERNAL AND INTERNAL THREATS

FortiDeceptor enables companies to rapidly create fabricated deception networks through the automated deployment of deception VMs and decoys that seamlessly integrate with existing infrastructures to trick attackers into revealing themselves.

FortiDeceptor serves as an early warning system by providing accurate detection of an attacker’s activity details and movement which is fed to a broader threat campaign.

Deception technology is unique, it is the only zero false positive cyber attack early warning system. It helps with breach protection by redirecting both external and internal threats away from critical assets. It creates multiple traps on a network with decoys disguised as data assets that alert the organisation whenever they have been triggered. FortiDeceptor lures cyber-criminals away from the valuable data and exposes their presence, without their knowledge, allowing forensic analysis in real time to closely monitor patterns, activities, and techniques to discover the breached devices and vulnerabilities. The intelligence gathered from the attack can automatically be applied to in-line security controls to stop attacks before there is any significant damage.

Features:

  • Actionable Visibility
  • Automated Protection
  • Deployment Ease

SECURE YOUR OT ENVIRONMENT WITH FORTIDECEPTOR

FortiDeceptor is now available as an industrially hardened rugged appliance – the FortiDeceptor Rugged 100G – for harsh industrial environments:

  • FortiDeceptor (both appliance and VM) also provides new OT/IoT/IT decoys to support diverse environments.
  • To combat emerging threats and vulnerabilities, FortiDeceptor also now enables on-demand creation of deception decoys based on newly discovered vulnerabilities, or suspicious activity, providing automated, dynamic protection across OT/IoT/IT environments.

FortiDeceptor Deception based Technology

FREE FortiDeceptor DEMO & CONSULTATION

Schedule a demonstration and see how FortiDeceptor enables companies to rapidly create fabricated deception networks through the automated deployment of deception VMs and decoys .

Please leave a few contact details and one of our Trusted Advisors will get back to you. Or call us to speak with someone immediately:

+44 (0)203 892 4812

secure@infosecpartners.com








    Close Menu