Leading IT analyst firm Enterprise Management Associates (EMA) surveyed over 200 leading cybersecurity and IT professionals to find out their opinions, experience and concerns regarding the use of deception technology as part of their threat defense strategy.
In their research, EMA found that usage of deception continues to gain acceptance among the most forward-leaning security operations teams that are trying to get out ahead of attackers and keep them from doing serious damage.
Reading this report, you will learn:
-
How and where deception is currently being used most effectively within enterprises
-
The advantages of deploying deception, such as more accurate detection of attackers, a decrease in
-
dwell time for users, and a greater understanding of attacker methods
-
The wide range of use cases where deception can be leveraged to reduce business risk
-
Where deception fits into defense strategies and the security stack