Deceptive networking lures hackers with decoy data

Deception technology, derived from military and intelligence agencies, is a method of planting decoy endpoints to confuse and slow down attackers. Then you can turn the tables in your favor.

Software to bog down hackers in fake endpoints is the latest trendy method of securing your network. Several startups are already involved in this field, known as deception technology, which can be thought of as a new twist on classic decoydocs.