Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    TopSpin Security’s DECOYnet Uses Deception to Defend Networks

    By
    Frank J. Ohlhorst
    -
    March 16, 2017
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      PrevNext

      1TopSpin Security’s DECOYnet Uses Deception to Defend Networks

      1 - TopSpin Security's DECOYnet Uses Deception to Defend Networks

      Many IT security professionals have come to rely on perimeter defense technologies in an effort to prevent attacks. However, as demonstrated by continual corporate data breaches, traditional security measures even when properly implemented, have come up short, attacks undetected and critical data exposed. Simply put, how can the IT department protect business assets if hackers are able to penetrate perimeter defenses undetected? Herzliya, Israel based TopSpin Security aims to solve that security problem with its DECOYnet platform that is that is designed to protect resources using a different ideology, one of deception. DECOYnet incorporates advanced forensics with extensive traffic gathering capabilities to assist administrators to camouflage their subnets from intruders. DECOYnet uses technology that valid resources, while directing attackers to decoy resources and traps.

      2DECOYnet Dashboard Tracks Suspicious Activity

      2 - DECOYnet Dashboard Tracks Suspicious Activity

      The dashboard shows summary information about various types of activity detected in DECOYnet. The top part of the window shows a graph view of all the incidents, decoy activity, amount of uploads and network activity (suspicious, but not yet over the threshold) detected in the platform. Red dots on the graph represent infected assets.

      3Suspicions Confirmed

      3 - Suspicions Confirmed

      By hovering over the various data points presented on the graph, security personnel can drill down into specific assets and gain more insight about ongoing attacks or suspicious activity.

      4Understanding the Story of Attack

      4 - Understanding the Story of Attack

      The Asset window provides users with the full profile of an infected machine, including the operating system, external data links, connected assets, browsers, which system and protocols the asset connects with and more.

      5Investigating Incidents

      5 - Investigating Incidents

      The Incidents window displays all the relevant incident-related information. Incidents in DECOYnet represent a collection of events, where each event is based on some type of activity in the network, such as accessing or attempting to access a decoy and the command and control communication. Incidents can be shown in order of severity or time of occurrence.

      6Forensic Analysis of Internet Connections

      6 - Forensic Analysis of Internet Connections

      The Communications Channels window displays information about the communication that go out of the organization to the Internet. These include anti-virus updates, Windows updates, FTP, Utorrents, shadow IT tools and so on. The channels are color coded as per the level of risk they pose to the organization.

      7Know Your Servers

      7 - Know Your Servers

      The Networking Servers window displays information about the servers accessed from inside the organization. Each circle represents a different type of server. The size of each displayed circle indicates its associated server’s popularity. The larger the circle the more heavily that server is used in the organization.

      80Mapping and Identifying Internal Traffic

      8 - Mapping and Identifying Internal Traffic

      Using the Internal Traffic window, security administrators can map the traffic going to and from servers. The information is presented in a graphical representation of all the servers within the network and the assets that are accessing those servers.

      9Detecting Suspicious Upload Activity

      9 - Detecting Suspicious Upload Activity

      The table in this slide shows all assets that have uploaded in the system. The graph at the top of the window shows the total uploads and downloads since system installation. Users can hover over a specific day in the graph to display details for the uploads that occurred that day.

      10Achieving Optimal Deception Coverage

      10 - Achieving Optimal Deception Coverage

      Using the Assets tab on the Environment window allows administrators to zoom in on decoys and mini-traps by double-clicking any icon on the Assets table. The deception coverage view at the bottom of the page shows exactly how the deception layer is spread out across the network.

      11There Are Point and Click Configuration Options

      11 - There Are Point and Click Configuration Options

      DECOYnet’s Adaptive Deception functionality can be easily configured and deployed via the Subnets tab on the Environment window. Enabling adaptive deception on a subnet is done using an intuitive wizard. This wizard defines an entire decoy network and the Mini-Traps the point to it on any subnet. Once enabled, DECOYnet will automatically adjust the deception layer to changing network conditions.

      PrevNext

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×