skip to Main Content
What is FortiDeceptor What It Does

In the event of an attack on the network, the technologies that make the attacker think that the attacker is successful by giving false targets “HoneyPot=FakeTarget” and directing them to an environment isolated from the network is called Deception Technology. FortiDeceptor, one of the product family supported by Netsys, is a product designed to deceive, reveal and eliminate internal and external threats. It blocks in the early stages of the attack and prevents the attacker from taking any damage against these threats. It is a very successful product in detecting and eliminating attacks, especially advanced attacks.

Using FortiDeceptor, the traps to be used are automated to reveal the attackers and block them before they can do damage. One of the important features of this product is that it can be natively integrated with Fortigate Firewall together with the Fortinet Security Fabric structure, thus providing end-to-end protection. Incorporating FortiDeceptor into your network topology as part of a breach protection strategy expands your defenses. Thanks to intrusion-based detection, security alerts can be configured for detected violations and it can be ensured to respond to these security alerts. FortiDeceptor can lay multiple decoys and decoys to help you hide sensitive and critical systems, thereby deceiving attackers and protecting critical systems behind the network.

Advanced Threat Scam

Deceive

With FortiDeceptor, it can create deceptive internal and external traps and create VM baits and traps from a centralized environment. Windows, Linux devices can be deployed and SCADA systems are created that are indistinguishable from the real thing, allowing attackers to reveal themselves.

 

Expose

Thanks to early and accurate detection systems, the attacker can perform operations by warning about its activity. The attacker can be tracked and his actions can be correlated. In this way, detailed forensic analysis processes can be performed and more detailed information can be obtained about the horizontal advance movements of the attackers.

 

Eliminate

By working integrated with Fortigate, it quarantines the attackers and disconnects the attackers. It stops attacks and prevents malware infection in the network.

 

Wizard-Based Distribution of Trapped VMs and Tokens

Both corporate and SCADA networks can be created via the VM with the help of a wizard.

 

Monitor and Correlate Events

Information about logging in/out of trap VMs, traversing, adding, modifying, deleting and executing files can be viewed and correlated.

 

Eliminating External and Internal Attacks

Identify and trap attackers. >prevents malware from spreading on the network.

 

Security Fabric Integration

With Fortigate integration, it detects the source of the attack and ensures that it is quarantined. Together with FortiSIEM, it provides comprehensive event management and visibility.

 

Generating Custom and Comprehensive Reports

  • PDF reports can be generated comprehensively via the GUI.
  • Configuring Alerts and Sending Alert Notifications
  • Supports sending e-mail, SNMP traps, SYSLOG data with FortiDeceptor.

 

FortiDeceptor reveals attacker activity with early and accurate detections. Activated through monitoring, action is taken and alerts are generated. Events can be accessed with FortiSIEM and FortiAnalyzer. It can be easily integrated with SOC products.

This Post Has 0 Comments

Leave a Reply

Your email address will not be published.

WAF Selection and Deployment Methods

We are pleased to share the recording of our webinar…

Read more
Back To Top