What is Deception Technology?

By 18.11.2020Blog

The ongoing COVID 19 pandemic and the subsequent move to remote working has massively expanded the organizations’ attack surface – and increased the need for a more proactive approach to security. Reactive security is no longer enough to protect corporate assets and data.

An article by Franz Weber, CEO CyberTrap Software GmbH, Vienna.

Why deception?

Attackers use deception techniques to their advantage. This includes everything from fake e-mails to stolen access data, and they use it to trick organizations into downloading malware or giving them access to valuable data.

The point of deception technology is to turn the tables on attackers. By basically turning any endpoint into a trap, it enables companies to use deception technology as part of their cybersecurity strategy to actively defend corporate data against unauthorized access.

Deception is not a honey pot

One of the biggest challenges is the misconception that deception is synonymous with a honeypot. Many people immediately think of honeypots (which, by the way, have been around for 25 years) when they hear “Deception”. The assumption is wrong.

Unlike honeypots, deception technology (like CYBERTRAP) redirects the attacker to a monitored environment where no damage can be done. It also uses threat analysis providing better information and forensic data for faster response.

We cannot continue to take a reactive approach to security and expect it to work against the enemies that are out there today. (F. Weber, CYBERTRAP)

Nearly all security technologies are based on a reactive mindset, which means attackers always have the benefit of moving first. They take advantage of this, and they are always one step ahead of us. Security is catching up, but we cannot catch up fast enough.

Does your company need Deception Technology?

By using lures and decoys that look like real data or systems, deception technology takes a different approach. Because these lures are fake and the intruder is the only one interacting with them. Gartner states in his “Hype Cycle for Security Operations 2020”: “A normal user should not interact with these artifacts – therefore there are almost no false alarms – but attackers look for exactly these when they want to move around in networks”. The new MITRE Shield framework is proof of the growing importance of deception technology.

How certain are you that your company has not yet fallen victim to an undetected cyber attack?

Request demo

About the author

Franz Weber Bio 02 01


CYBERTRAP is an Austrian company providing cyber security software, which is specialized in active defense and deception. Using Deception Technology, attackers are redirected into a specially created IT infrastructure before they can move further into the actual infrastructure of the company and cause damage.

What do cyber attacks really cost?

According to a recent survey, the cost of data breaches can be reduced by over 51% through deception technology, resulting in an average reduction in data breach costs of around €2 million per incident. In addition, companies could save a lot of money per SOC analyst per year.

Arrange a personal meeting with a contact person in your area now:

Arrange a callback