Deception Technology: A deceivingly simple solution to complex threats
Attivo Networks Blogs

Deception Technology: A deceivingly simple solution to complex threats

Written by: Marc Feghali, Co-founder and VP of Product Management – You have almost certainly heard about Deception Technology for cybersecurity, but may be wondering what it will take to implement it in your environment. It seems complex. How can you possibly deploy it in your own diverse, distributed, and complicated network? No doubt you have the battle scars attesting to the challenge of deploying new security controls on your network. So how do you proceed?

To illustrate our point on simplicity, this enterprise case study will show, even with a larger installation, that deception is exceptionally easy to prepare, deploy, and operate. Here is an example of a deployment that a current customer of ours implemented.

Goal: Deploy deception inside the network to cover network-based attacks, credential-based attacks, attacks against Active Directory, detect Man-the-Middle attacks while providing network visibility across all locations.

Integrate seamlessly with existing EDR, NAC, and SIEM solutions to automatically quarantine infected systems

The Network: 100 local VLANs/subnets distributed between access networks and a hybrid datacenter. 200 remote locations with up to 8 VLANs each and a data center. 10,000 employees spread across multiple locations.

The Solution: 1 Attivo BOTsink® 5000 series, ThreatDirect™, ThreatStrike™ Deceptive Credentials and ThreatPath™

To achieve their objectives, the customer deployed an Attivo BOTsink 5000 series server on their local network and ThreatDirect in each remote location to get coverage of their remote offices and datacenter. Using this configuration, the customer blanketed their entire local and remote network environment with full visibility and deception on all of their VLANs and subnets. It took less than a day to fully deploy the system at HQ with a rolling thunder deployment covering the endpoints and remote locations, enabling the customer to stick to scheduled maintenance windows.

The Deployment Process

The customer started by mounting their BOTsink appliance (it can deploy as a physical appliance, virtual appliance, or a cloud instance) and connecting it to a trunk port on their network. Once on the network, the BOTsink server automatically identified connected VLANs and subnets and requested IP addresses in each. Alternatively, the customer could have chosen to assign IP addresses manually across the desired VLANs.

Using the ThreatStrike platform on the endpoints, a BOTsink server generates, manages, and updates decoy applications and cloud credentials to help guard against targeted attacks. In this case, the customer deployed ThreatStrike to their endpoints, servers, and in Active Directory. The decoy credentials are hidden from normal users. Any use of them generates a high fidelity alert identifying the compromised system, stolen credentials used, and all of the attack details.

To support their remote locations and data center, the customer deployed ThreatDirect at each location. This gave them coverage of the remote VLANs and subnets, extending the BOTsink server capabilities to those sites without losing functionality. Through ThreatDirect, the customer gained visibility into their remote locations, meaning any attacker would have to traverse a deception minefield in the remote sites, not just on the headquarters network.

The BOTsink was also configured to automatically quarantine an attacker by leveraging their existing security infrastructure. In practice, once an attacker engages with the deception environment, the BOTsink contains the attack, collects TTPs and IOCs, and shares this intelligence with other security solutions to expedite remediation. The Attivo ThreatDefend™ platform has extensive integrations with NAC, EDR, endpoint solutions, SIEM, firewalls, and gateways to make this automatic and simple.

With Attivo Networks, implementing deception is a straight forward proposition that dramatically reduces dwell time and mean time to remediation. It’s versatile enough to fit into any environment, it is highly scalable, and is extremely easy to deploy, manage, and operate. In today’s threat landscape, it really can’t get much easier than this to gain the upper hand against attackers. To learn more about the ThreatDefend platform, visit our product page.

Share on:

Free Active Directory Assessment

Get Visibility Into Privilege And Service Account Exposure

For a limited time, Attivo Networks is providing free Active Directory Security Assessments to demonstrate how ADAssessor provides unprecedented and continuous visibility to AD vulnerabilities.

Try Our Endpoint Detection Net (EDN) for Free


Free use offer of our Award-winning security solution to prevent attackers from lateral movement, credential theft, and privilege escalation, fast and easy.

Newsletter Signup

    Yes, please opt me in to receive your quarterly newsletter, event invitations, and product updates.

    I understand that I can opt out at any time, and can refer to Attivo Networks Privacy Policy for more information.
  • This field is for validation purposes and should be left unchanged.

ADSecure 90-Day Free Trial


  • Hide and deny access to AD objects
  • Get alerted on unauthorized queries
  • Attack details easily viewable in dashboard
  • Your data remains on-premise


Leave a Comment

Your email address will not be published. Required fields are marked *

four × four =

Ready to find out what’s lurking in your network?

Scroll to Top