Post-RSAC 2017: Understanding Honeypot Architecture vs. Deception Technology

Presented by

Chad Gasaway

About this talk

Despite the increasing effort that organizations put into keeping intruders out of their networks, once sophisticated attackers zero-in on a specific company or information source, there’s a good chance they’ll find a way in. We talked to hundreds of people during the RSA Conference and we noticed there was a lack of information and education on the difference between passive honeypot architecture and active defense deception technology. Register for this webinar as Chad Gasaway, Director of Sales Engineers at illusive networks, will explain the differences between the two architectures and help you understand what type of solution is best for your environment. Please join us March 15th for this live webinar event.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (7)
Subscribers (865)
illusive networks is pioneering deception based cybersecurity. Its patent pending Deceptions Everywhere® technology neutralizes targeted attacks and Advanced Persistent Threats (APT). By creating a deceptive layer across the entire network — every endpoint, server, and network component ­ with an endless source of false information, illusive networks disrupts and detects breaches with real time forensics and without interrupting business.