{"id":9400,"date":"2020-02-25T18:18:51","date_gmt":"2020-02-26T02:18:51","guid":{"rendered":"https:\/\/www.acalvio.com\/?p=9400"},"modified":"2020-02-25T18:18:51","modified_gmt":"2020-02-26T02:18:51","slug":"decoys-lures-breadcrumbs-deception-technology-turns-the-tables-on-attackers","status":"publish","type":"post","link":"https:\/\/acalvio.p2staging.us\/index.php\/2020\/02\/25\/decoys-lures-breadcrumbs-deception-technology-turns-the-tables-on-attackers\/","title":{"rendered":"Decoys, Lures &#038; Breadcrumbs: Deception Technology Turns the Tables on Attackers"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.22&#8243;][et_pb_row _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Decoys, Lures and Breadcrumbs: Deception Technology Turns the Tables on Attackers&#8221; _builder_version=&#8221;3.27.4&#8243;]<\/p>\n<h1>Decoys, Lures and Breadcrumbs:<br \/>Deception Technology Turns the Tables on Attackers<\/h1>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/acalvio.p2staging.us\/wp-content\/uploads\/2020\/02\/ema-webcast2.png&#8221; url=&#8221;https:\/\/www.brighttalk.com\/webcast\/14861\/386523\/decoys-lures-breadcrumbs-deception-technology-turns-the-tables-on-attackers&#8221; url_new_window=&#8221;on&#8221; align_tablet=&#8221;center&#8221; align_last_edited=&#8221;on|desktop&#8221; admin_label=&#8221;Webinar Image&#8221; _builder_version=&#8221;3.23&#8243;][\/et_pb_image][et_pb_code admin_label=&#8221;About the Webinar&#8221;]<\/p>\n<h1>About this Webinar<\/h1>\n<p><!-- [et_pb_line_break_holder] --><pee>The use of deception technology designed to throw off stealthy attackers from real assets and gather intelligence about how they operate is gaining ground in the enterprise. <\/pee><!-- [et_pb_line_break_holder] --><pee>Enterprise Management Associates in 2019 conducted a research project to gauge interest in this evolving new defense and uncover deception technology usage trends and advantages it delivers that are unique in the market. Join Paula Musich, a research director in the IT Security and Risk Management practice at EMA, for a webinar that will explore the results of this study. <\/pee><!-- [et_pb_line_break_holder] --><pee>B <\/pee><!-- [et_pb_line_break_holder] --><\/p>\n<h2>The webinar will highlight:<\/h2>\n<p><!-- [et_pb_line_break_holder] --><uL><!-- [et_pb_line_break_holder] --><\/p>\n<li>Advantages such as more accurate detection of attackers, a dramatic decrease in dwell time for users, and greater understanding of attackersb\u0000\u0019 methods<\/li>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<li>Use cases<\/li>\n<p><!-- [et_pb_line_break_holder] --><\/p>\n<li>Expectations of those looking to adopt deception technology<\/li>\n<p><!-- [et_pb_line_break_holder] --><\/ul>\n<p><!-- [et_pb_line_break_holder] --><pee>Live online Mar 10, or after on demand | 105 mins<!b\u0000\u0013- [et_pb_br_holder] -b\u0000\u0013><!-- [et_pb_line_break_holder] --><strong>Presented by:<\/strong><!b\u0000\u0013- [et_pb_br_holder] -b\u0000\u0013><!-- [et_pb_line_break_holder] -->Paula Musich &#8211; Research Director, Security and Risk Management, Enterprise Management Associates<\/pee>[\/et_pb_code][et_pb_code admin_label=&#8221;Attend Acalvio EMA Webinar&#8221;]<pee style=\"margin-top:36px;\"><!-- [et_pb_line_break_holder] --><a href=\"https:\/\/www.brighttalk.com\/webcast\/14861\/386523\/decoys-lures-breadcrumbs-deception-technology-turns-the-tables-on-attackers\" target=\"_blank\" style=\"cursor: hand;\" rel=\"noopener noreferrer\"><button type=\"button\" class=\"btn btn-default\" style=\"background-color:#A21D20;color:#ffffff;padding:8px 24px;border:1px solid #A21D20;cursor: hand;font-size:16px;\">VIEW THE WEBINAR<\/button><!-- [et_pb_line_break_holder] --><\/a><!b\u0000\u0013- [et_pb_br_holder] -b\u0000\u0013>Acalvio  |  BrightTALK<!-- [et_pb_line_break_holder] --><\/pee>[\/et_pb_code][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Using deception technology to throw off stealthy attackers from real assets, gather intelligence about how they operate&#8230;<\/p>\n","protected":false},"author":2,"featured_media":9403,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[14],"tags":[],"_links":{"self":[{"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/posts\/9400"}],"collection":[{"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/comments?post=9400"}],"version-history":[{"count":0,"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/posts\/9400\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/media\/9403"}],"wp:attachment":[{"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/media?parent=9400"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/categories?post=9400"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/tags?post=9400"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}