skip to main content


Most organizations accept that the malicious penetration of their networks by human attackers and/or automated malware is inevitable.


  • Activity associated with decoys, which are of no interest to genuine users, can be assumed to be malicious, so there should be no false positives.

Features and Benefits

  • Describes how deception technology works.
  • Explains the different approaches to deception.

Key questions answered

  • What is a low-interaction decoy?
  • Does deception tech help with detection?

Table of contents

Ovum view

  • The use of deception to fool attackers in cyberspace
  • The inevitability of cyberattacks
  • The value of deception technology
  • The emerging market for deception


  • Further reading
  • Author