{"id":9604,"date":"2020-03-21T06:34:44","date_gmt":"2020-03-21T13:34:44","guid":{"rendered":"https:\/\/www.acalvio.com\/?page_id=9604"},"modified":"2020-03-21T06:34:44","modified_gmt":"2020-03-21T13:34:44","slug":"decoys-lures-and-breadcrumbs-deception-technology-turns-the-tables-on-attackers","status":"publish","type":"page","link":"https:\/\/acalvio.p2staging.us\/index.php\/decoys-lures-and-breadcrumbs-deception-technology-turns-the-tables-on-attackers\/","title":{"rendered":"Decoys, Lures and Breadcrumbs: Deception Technology Turns the Tables on Attackers"},"content":{"rendered":"<p>[et_pb_section bb_built=&#8221;1&#8243;][et_pb_row][et_pb_column type=&#8221;4_4&#8243;][et_pb_text admin_label=&#8221;Decoys, Lures and Breadcrumbs: Deception Technology Turns the Tables on Attackers&#8221; _builder_version=&#8221;3.7.1&#8243;]<\/p>\n<h1>Decoys, Lures and Breadcrumbs:<br \/>Deception Technology Turns the Tables on Attackers<\/h1>\n<p>[\/et_pb_text][et_pb_image admin_label=&#8221;Webinar Image&#8221; _builder_version=&#8221;3.7.1&#8243; src=&#8221;https:\/\/acalvio.p2staging.us\/wp-content\/uploads\/2020\/02\/ema-webcast2.png&#8221; url=&#8221;https:\/\/www.brighttalk.com\/webcast\/14861\/386523\/decoys-lures-breadcrumbs-deception-technology-turns-the-tables-on-attackers&#8221; url_new_window=&#8221;on&#8221; \/][et_pb_code admin_label=&#8221;About the Webinar&#8221; _builder_version=&#8221;3.7.1&#8243;]&lt;h1&gt;About this Webinar&lt;\/h1&gt;&lt;!&#8211; [et_pb_line_break_holder] &#8211;&gt;&lt;p&gt;The use of deception technology designed to throw off stealthy attackers from real assets and gather intelligence about how they operate is gaining ground in the enterprise. &lt;\/p&gt;&lt;!&#8211; [et_pb_line_break_holder] &#8211;&gt;&lt;p&gt;Enterprise Management Associates in 2019 conducted a research project to gauge interest in this evolving new defense and uncover deception technology usage trends and advantages it delivers that are unique in the market. Join Paula Musich, a research director in the IT Security and Risk Management practice at EMA, for a webinar that will explore the results of this study. &lt;\/p&gt;&lt;!&#8211; [et_pb_line_break_holder] &#8211;&gt;&lt;p&gt;&amp;nbsp;&lt;\/p&gt;&lt;!&#8211; [et_pb_line_break_holder] &#8211;&gt;&lt;h2&gt;The webinar will highlight:&lt;\/h2&gt;&lt;!&#8211; [et_pb_line_break_holder] &#8211;&gt;&lt;uL&gt;&lt;!&#8211; [et_pb_line_break_holder] &#8211;&gt;&lt;li&gt;Advantages such as more accurate detection of attackers, a dramatic decrease in dwell time for users, and greater understanding of attackersb\u0000\u0019 methods&lt;\/li&gt;&lt;!&#8211; [et_pb_line_break_holder] &#8211;&gt;&lt;li&gt;Use cases&lt;\/li&gt;&lt;!&#8211; [et_pb_line_break_holder] &#8211;&gt;&lt;li&gt;Expectations of those looking to adopt deception technology&lt;\/li&gt;&lt;!&#8211; [et_pb_line_break_holder] &#8211;&gt;&lt;\/ul&gt;&lt;!&#8211; [et_pb_line_break_holder] &#8211;&gt;&lt;p&gt;Live online Mar 10, or after on demand | 105 mins&lt;br&gt;&lt;!&#8211; [et_pb_line_break_holder] &#8211;&gt;&lt;strong&gt;Presented by:&lt;\/strong&gt;&lt;br&gt;&lt;!&#8211; [et_pb_line_break_holder] &#8211;&gt;Paula Musich &#8211; Research Director, Security and Risk Management, Enterprise Management Associates&lt;\/p&gt;[\/et_pb_code][et_pb_code admin_label=&#8221;Attend Acalvio EMA Webinar&#8221; _builder_version=&#8221;3.7.1&#8243;]&lt;p style=&quot;margin-top:36px;&quot;&gt;&lt;!&#8211; [et_pb_line_break_holder] &#8211;&gt;&lt;a href=&quot;https:\/\/www.brighttalk.com\/webcast\/14861\/386523\/decoys-lures-breadcrumbs-deception-technology-turns-the-tables-on-attackers&quot; target=&quot;_blank&quot; style=&quot;cursor: hand;&quot;&gt;&lt;button type=&quot;button&quot; class=&quot;btn btn-default&quot; style=&quot;background-color:#A21D20;color:#ffffff;padding:8px 24px;border:1px solid #A21D20;cursor: hand;font-size:16px;&quot;&gt;VIEW THE WEBINAR&lt;\/button&gt;&lt;!&#8211; [et_pb_line_break_holder] &#8211;&gt;&lt;\/a&gt;&lt;br&gt;Acalvio  |  BrightTALK&lt;!&#8211; [et_pb_line_break_holder] &#8211;&gt;&lt;\/p&gt;[\/et_pb_code][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[et_pb_section bb_built=&#8221;1&#8243;][et_pb_row][et_pb_column type=&#8221;4_4&#8243;][et_pb_text admin_label=&#8221;Decoys, Lures and Breadcrumbs: Deception Technology Turns the Tables on Attackers&#8221; _builder_version=&#8221;3.7.1&#8243;] Decoys, Lures and Breadcrumbs:Deception Technology Turns the Tables on Attackers [\/et_pb_text][et_pb_image admin_label=&#8221;Webinar Image&#8221; _builder_version=&#8221;3.7.1&#8243; src=&#8221;https:\/\/acalvio.p2staging.us\/wp-content\/uploads\/2020\/02\/ema-webcast2.png&#8221; url=&#8221;https:\/\/www.brighttalk.com\/webcast\/14861\/386523\/decoys-lures-breadcrumbs-deception-technology-turns-the-tables-on-attackers&#8221; url_new_window=&#8221;on&#8221; \/][et_pb_code admin_label=&#8221;About the Webinar&#8221; _builder_version=&#8221;3.7.1&#8243;]&lt;h1&gt;About this Webinar&lt;\/h1&gt;&lt;!&#8211; [et_pb_line_break_holder] &#8211;&gt;&lt;p&gt;The use of deception technology designed to throw off stealthy attackers from real assets and [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/pages\/9604"}],"collection":[{"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/comments?post=9604"}],"version-history":[{"count":0,"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/pages\/9604\/revisions"}],"wp:attachment":[{"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/media?parent=9604"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}