透過及早、精準的攻擊偵測(無誤報)縮短停留時間
FortiDeceptor 透過與您環境中分佈的各種誘騙資產互動,誘導攻擊者在偵察階段早期暴露自己。該平台會根據與攻擊者和惡意軟體的即時互動,產生高度真實的警示,並提供攻擊活動分析和攻擊隔離。這有助於減輕 SOC 團隊因誤報所造成的負擔。FortiDeceptor 提供靈活的部署選項:SaaS(雲端託管)、本地部署(硬體/虛擬機器)及公有雲(AWS、Azure、GCP)。
立即觀看FortiDeceptor 為 Fortinet SecOps 平台的一環,能偵測並回應網路上的攻擊,例如遭竊的憑證使用、橫向移動、中間人攻擊和勒索軟體。新增 FortiDeceptor 作為網路安全策略的一部分,幫助將您的防禦從被動轉變為主動,並利用內容相關情報分層進行入侵的偵測。
FortiDeceptor 透過與您環境中分佈的各種誘騙資產互動,誘導攻擊者在偵察階段早期暴露自己。該平台會根據與攻擊者和惡意軟體的即時互動,產生高度真實的警示,並提供攻擊活動分析和攻擊隔離。這有助於減輕 SOC 團隊因誤報所造成的負擔。FortiDeceptor 提供靈活的部署選項:SaaS(雲端託管)、本地部署(硬體/虛擬機器)及公有雲(AWS、Azure、GCP)。
立即觀看
FortiDeceptor-as-a-Service 是一款基於 SaaS 的誘騙解決方案,能偵測並應對網路內部攻擊,例如盜用憑證、橫向移動、中間人攻擊(MITM)及勒索軟體。利用組織現有的IP位址,誘餌程式在Fortinet私有雲中運行的FortiDeceptor-as-a-Service平台上執行。誘餌僅利用未使用的IP位址,且不影響網路可用性。當自動化/人工攻擊者與誘餌互動時,他們已處於您的網路之外,無法造成進一步損害。
下載解決方案簡介當攻擊者與誘騙資產互動時,例如端點上的假檔案,或者惡意軟體嘗試加密假檔案時,FortiDeceptor 可以透過自動隔離任何遭入侵的端點讓攻擊無效。此舉可防止攻擊擴散,並切斷與C&C伺服器的通訊。這可使用 FortiDeceptor 內建的自動攻擊隔離功能完成,也可以透過向 SIEM/SOAR 傳送警示以獲得協調回應來完成。
立即觀看
為應對新興威脅與漏洞,FortiDeceptor能依據新發現的漏洞或可疑活動,即時生成誘餌裝置,在營運技術/物聯網/資訊技術環境中提供自動化動態防護。此外,FortiDeceptor 提供了 SOAR 行動手冊用於按需部署誘騙資產,以回應網路中的可疑活動,其回應能力超出 SOAR 證據和自動化的主機隔離行動手冊。
動態誘騙平台,廣泛支援 IT/OT/IoT 環境,可轉移攻擊者對敏感資產的注意力,讓防禦者獲得優勢。
可見度 & 加速回應
與 Fortinet 安全織網和第三方安全控制(SIEM、SOAR、EDR、沙箱)整合
內部威脅偵測
減少停留時間和誤報,偵測早期偵察和橫向移動以誤導攻擊
鑑識 & 威脅情報
即時擷取和分析攻擊活動,提供詳細的取證,並收集 IOC 和 TTP
隔離/解除隔離攻擊
可將受感染端點從生產網路中隔離
針對工業物聯網(OT/IoT)網路進行優化
廣泛的誘餌包括SCADA系統、物聯網感測器,此外您還能上傳自訂誘餌
簡易部署 & 維護
自動部署與資產相符的誘餌,不會影響穩定性和效能
FortiDeceptor 目的是為了在攻擊鏈早期誘騙、暴露和消除內外部威脅,並主動封鎖這些威脅,以免發生任何重大損害。它可作為硬體和虛擬設備使用,並提供加固版本,非常適合嚴苛的環境。
導覽:
形式 |
桌上型電腦 - 無風扇 |
最大 VLAN 數 |
48 |
介面總數 |
6個 1GbE RJ-45 埠 |
預設 RAID 層級 |
否 |
電源供應器 |
24V直流電 - 48V直流電輸入 |
形式 |
1 RU 機架安裝式 |
最大 VLAN 數 |
128 |
介面總數 |
4 x GE (RJ45),4 x GE (SFP) |
預設 RAID 層級 |
1 |
電源供應器 |
雙電源供應器可選配 |
Improved Security Team Operational Efficiency and Reduced Risk to the Organization, Each by Up to 99%
Security operations requirements, like threat detection and response, continue to grow more challenging each year. According an Economic Validation report from TechTarget’s Enterprise Strategy Group, it can take 168 hours or more, on average, to identify threats, while many threats are never detected.1 Therefore, CISOs should consider deception technology for improving threat detection and response. Modern deception technology like FortiDeceptor combines the historical value of deception technology with ease of use, automation, and actionable intelligence—creating an active defense. These benefits are especially important for organizations with limited security staff and skills and those merging IT and OT.
Deception can provide value across the attack chain by not only deceiving adversaries, but also detecting, enabling forensics data, or even helping with real-time mitigation.
Protecting business-critical data is becoming increasingly complex—and by extension, increasingly relevant for today's organizations. One critical element of this evolution is their increasing reliance on, and hyperconnectivity across foundational technologies such as data centers, cloud platforms, SaaS applications, and broadly adopted software vendors like Microsoft and SAP.
Deception technology should be fully integrated with NGFW, NAC, SIEM, Sandbox, SOAR, and EDR solutions to automate the mitigation response based on ransomware detection. By combining deception technology with a comprehensive security platform, organizations will be able to detect and respond to attacks, such as ransomware, long before they can achieve their malicious goals.
FortiDeceptor is a simple-to-use, non-intrusive solution that provides early detection of threats that target OT and IT environments. By deploying decoys and honeytokens, FortiDeceptor automates the containment of cyberattacks before serious damage occurs.
With FortiDeceptor-as-a-Service, you can leverage advanced deception technologies to deceive attackers into engaging with fake assets, data, and applications.
Whether a security breach happens due to an external or internal attack, it can take months for an organization to discover the breach and begin remediation.
Moshe Ben Simon makes the case and provides examples of how deception technologies can be used in OT systems. This can delay the attacker and give the defender more time to detect and respond to the attack before the attacker succeeds. Deception also provides a high fidelity signal since no one should access the deception device or system.
In operational technology environments, safety and continuity are crucial considerations—but traditional security controls simply won’t protect OT infrastructure, much of which wasn't designed to combat today’s fast-evolving threats. With air gaps between IT and OT decreasing and OT/IT devices often deployed in the same segment, bad actors have increased opportunities to move laterally across IT/OT infrastructures.
FortiDeceptor, Fortinet’s innovative, non-intrusive, agentless OT/IT/IoT deception solution is a force multiplier to current security defenses, providing early detection and response to active in-network threats. The FortiDeceptor decoys generate high-fidelity, intelligence-based alerts that result in an automated incident response to help stop zero-day attacks. In this session, VP Product Management, FortiDeceptor, Moshe Ben Simon, provides valuable tips and insights on how to use deception for early breach detection and protection against cyber threats across the IT/OT environment.
Fortinet's FortiDeceptor is a Distributed Deception Platform (DDP), simulating various types of IT, OT, ICS, and IoT decoys, as well as critical applications (e.g. ERP/SAP, etc.).
Verizon's 2018 DBIR reports two-thirds of breaches come from external attacks while the remaining are from insider threats. FortiDeceptor is built to deceive and redirect both external and internal attacks to a network of decoys. It exposes these reconnaissance attacks and eliminates them, disrupting the entire kill chain before it even begins.