Skip to content Skip to navigation Skip to footer

概述

作为 Fortinet SecOps 平台重要组件之一,FortiDeceptor 可快速检测并响应各类网内攻击,如:凭据窃取、威胁横向移动、中间人攻击和勒索软件攻击。部署 FortiDeceptor 并集成至现有网络安全策略,组织可利用丰富的上下文情报实现基于入侵的分层检测,助力组织从传统被动式防御转变为主动式防御模式。

通过早期、准确的攻击检测(无误报)缩短滞留时间

FortiDeceptor 借助分布于整个网络环境的大量欺骗资产,诱骗攻击者在侦察阶段早期即自行暴露。此外,该解决方案还可根据系统与攻击者和恶意软件的实时互动,为用户生成高保真告警,提供攻击活动分析,并进行攻击隔离。这些举措均有助于减轻大量告警误报对 SOC 团队造成的繁重任务负担。FortiDeceptor提供灵活的部署选项:SaaS(云托管)、本地部署(硬件/虚拟机)和公有云(AWS、Azure、GCP)。

立即观看
FortiDeceptor即服务解决方案可帮助克服常见挑战,例如检测勒索软件攻击和零日威胁、提供入侵前预警、保护未打补丁的传统OT/IoT系统等。

使用FortiDeceptor-as-a-Service将攻击转移至网络外部,确保网络安全无忧

FortiDeceptor-as-a-Service(作为服务提供的欺骗解决方案)是一款基于SaaS的欺骗方案,能够检测并应对网络内部攻击,例如被盗凭证使用、横向移动、中间人攻击(MITM)以及勒索软件攻击。利用组织的可用IP地址,诱饵程序在位于Fortinet私有云中的FortiDeceptor-as-a-Service平台上运行。诱饵仅利用未使用的IP地址,不会影响网络可用性。当自动化/人工攻击者与诱饵互动时,他们已处于网络外部,无法造成进一步损害。

下载解决方案简报

自动遏制网络内部攻击,防止其扩散

当攻击者企图窃取终端上的虚假文件等欺骗资产时,或当恶意软件企图加密虚假文件时,FortiDeceptor 均可自动隔离任意被入侵终端,及时遏制攻击行为。这可阻止攻击扩散,并切断与C&C服务器的通信。借助 FortiDeceptor 内置攻击自动隔离功能,或向 SIEM/SOAR 发送告警进行协同响应,均可实现此类防护。

马上观看
FortiDeceptor 用户界面

随着威胁等级的提升,动态威胁防护能力将相应增强

为应对新兴威胁与漏洞,FortiDeceptor可基于新发现的漏洞或可疑活动即时创建诱饵系统,在运营技术/物联网/信息技术环境中提供自动化动态防护。除了由 SOAR 提供对目标主机进行自动隔离的丰富 Playbook 外,FortiDeceptor 还支持按需部署欺骗资产的 SOAR Playbook,以快速响应网络中潜伏的可疑活动。

功能与优势

动态欺骗防护平台可将攻击者诱离敏感资产,全面保护 IT/OT/IoT 环境,助力防御者抢占先机。

可见性 & 加速响应

与 Fortinet Security Fabric 和第三方安全控制组件(SIEM、SOAR、EDR、沙箱)广泛集成

内部威胁检测

减少攻击者停留时间和告警误报,有效检测早期侦查和横向移动,实现迷惑各类攻击的目的

取证 & 威胁情报

实时捕获和分析攻击活动,提供详细的取证信息,收集入侵指标(IOC)和攻击者使用的战术、技术和程序(TTP)

隔离/解除隔离攻击

自动将受感染终端与生产网络快速隔离

针对OT/IoT网络进行优化

广泛的诱饵包括监控和数据采集系统、物联网传感器,此外您还可以上传自己的诱饵。

轻松部署 & 维护

自动部署与资产相匹配的诱饵,丝毫不影响运行稳定性和性能表现

FortiDeceptor 应用场景

Detection
动态欺骗
利用攻击者行踪实现网络可见性和漏洞检测。针对无法自行提供遥测结果的资产进行威胁检测。
Malware Protection
勒索软件缓解措施
及早检测和响应勒索软件攻击。诱导恶意软件加密假文件,触发被感染终端自动防御策略。
icon lateral movement detection
侧向移动检测
在发现阶段及早检测攻击者,并将横向活动诱骗至高度仿真的诱饵资产,使其远离真实资产。
icon active directory deception
活动目录欺骗
提供Active Directory诱饵和令牌,用于检测针对AD的威胁。
icon ot
IT/OT/IoT/IoMT安全
提供 SCADA 系统、物联网传感器等广泛仿真诱饵,支持自定义诱饵上传。
icon detect insider
第二层攻击检测
检测中间人攻击、NBNS欺骗检测器、NBT-NS、mDNS、LLMNR欺骗,采用主动与被动检测方法。

企业分析师权威认可

ESG FortiDeceptor 报告展示
Fortinet SecOps Fabric ESG 经济验证报告
Cover of ESG report titled Active Defense and Deception Technology: The Time is Now! Written by John Olsik, distinguished analyst and fellow, and published June 2023
主动防御和欺骗防护技术:正当其时!
威胁检测和响应等安全运营要求正变得越来越具有挑战性。据 TechTarget 企业战略小组(ESG)的经济验证报告显示,成功识别威胁平均耗时 168 小时或更长时间,而与此同时,许多威胁却从未被检测到。因此,首席信息安全官(CISO)应考虑采用诱捕技术提升组织的威胁检测和响应能力。FortiDeceptor 商用蜜罐解决方案既具备诱捕技术的传统优势,又具备易用性、自动化和可操作威胁情报等创新优势,二者结合共筑主动防御。这些优势对于安全人员和技能水平有限以及希望构建 IT 与 OT 融合的组织而言尤为重要。
下载报告 »
ESG Economic Validation: The Quantified Benefits of Fortinet Security Operations Solutions. Improved security team operational efficiency and reduced risk to the organization, each by up to 99%. Written by Aviv Kaufmann, Practice Director and Principal Economic Validation Analyst at Enterprise Strategy Group. January 2025
Fortinet 安全运营解决方案的量化优势
随着企业的不断发展、新技术的不断涌现以及网络犯罪分子持续引入更多复杂攻击,安全领导者及其团队在保护组织网络方面面临重重挑战。企业战略组(Enterprise Strategy Group)研究团队在最新发布的报告中,详细介绍了企业部署 Fortinet 安全运营解决方案后获得的诸多优势,包括提高运营效率和构建更有效的风险管理体系。
下载报告 »

案例研究

Renfrew Victoria Hospital and St. Francis Memorial Hospital
Renfrew Victoria Hospital and St. Francis Memorial Hospital
Community-Based Canadian Hospitals Enhance Connectivity and Improve Operational Efficiency with the Fortinet Security Fabric
Consulting Services and SparkFound
Consulting Services and SparkFound
Fortinet SecOps Empowers Argentinian SOC Firm with Integrated, Proactive Security
Lintasarta
Lintasarta
Elevating Cybersecurity and Operational Efficiency in Indonesia’s Digital Landscape
City of Kimberley
City of Kimberley
Canadian Municipality Upgrades and Simplifies Its Cybersecurity Infrastructure with the Fortinet Security Fabric

型号与规格

FortiDeceptor 旨在帮助用户在攻击杀伤链早期欺骗、暴露和消除各类内外部威胁,并在攻击者造成严重破坏前主动拦截威胁。FortiDeceptor 支持硬件和虚拟机两种部署模式,并提供适用于恶劣环境的加固版可供用户选购。

View by:

硬件设备

外形
台式机 - 无风扇
最大 VLAN 数
48
接口总数
6个1GbE RJ-45端口
默认 RAID 等级
适用电源
24V直流 - 48V直流输入
外形
1RU机架安装
最大 VLAN 数
128
接口总数
4 个千兆以太网(RJ45),4 个千兆以太网(SFP)
默认 RAID 等级
1
适用电源
可选双电源供应器

虚拟机

FortiDeceptor 虚拟设备支持 VMware 和 KVM 平台部署。

最大 VLAN 数
128
接口
6 个虚拟网络接口

资源

分析报告
博文
技术参数表
订购指南
播客
解决方案简报
视频
白皮书
Deceive By Design: How To Protect Critical Infrastructure With Deception Technology
Deceive By Design: How To Protect Critical Infrastructure With Deception Technology »

Moshe Ben Simon makes the case and provides examples of how deception technologies can be used in OT systems. This can delay the attacker and give the defender more time to detect and respond to the attack before the attacker succeeds. Deception also provides a high fidelity signal since no one should access the deception device or system.

Security Automation Summit: How To Use Deception Technology To Protect Your OT/ IT Networks
Security Automation Summit: How To Use Deception Technology To Protect Your OT/ IT Networks »

In operational technology environments, safety and continuity are crucial considerations—but traditional security controls simply won’t protect OT infrastructure, much of which wasn't designed to combat today’s fast-evolving threats. With air gaps between IT and OT decreasing and OT/IT devices often deployed in the same segment, bad actors have increased opportunities to move laterally across IT/OT infrastructures.

How to Use Fortinet FortiDeceptor to Protect OT/IT Networks
How to Use Fortinet FortiDeceptor to Protect OT/IT Networks »

FortiDeceptor, Fortinet’s innovative, non-intrusive, agentless OT/IT/IoT deception solution is a force multiplier to current security defenses, providing early detection and response to active in-network threats. The FortiDeceptor decoys generate high-fidelity, intelligence-based alerts that result in an automated incident response to help stop zero-day attacks. In this session, VP Product Management, FortiDeceptor, Moshe Ben Simon, provides valuable tips and insights on how to use deception for early breach detection and protection against cyber threats across the IT/OT environment.

Deception Technology for IT/OT/IoT Environments
Deception Technology for IT/OT/IoT Environments »

Fortinet's FortiDeceptor is a Distributed Deception Platform (DDP), simulating various types of IT, OT, ICS, and IoT decoys, as well as critical applications (e.g. ERP/SAP, etc.).

A New Breach Protection Approach with FortiDeceptor
A New Breach Protection Approach with FortiDeceptor »

Verizon's 2018 DBIR reports two-thirds of breaches come from external attacks while the remaining are from insider threats. FortiDeceptor is built to deceive and redirect both external and internal attacks to a network of decoys. It exposes these reconnaissance attacks and eliminates them, disrupting the entire kill chain before it even begins.

免费产品演示

欺骗防护设计:了解如何使用欺骗防护技术有效保护 IT/OT 资产。

演示内容:

  • 了解如何根据最新威胁部署动态欺骗防护层
  • 了解如何 早期 在几秒内检测并隔离攻击 且零误报
  • 了解如何使用诱饵技术全面保护未打补丁的 OT 和 IoT 系统