10 Emerging Security Technologies Gaining Interest, Adoption
10. Decoy Tech Or Honeypots 2.0
Honey Pots have been around for years, but security experts say the technology is being made more widely available in an attempt to thwart attackers. Decoy documents and bogus systems can be set up to make attacks take longer, providing a greater chance detection systems will trigger. Accenture cited two firms, New York City-based Allure Security Technology, which uses decoy documents to track attackers, and Tempe, Ariz.-based DataSoft, which offers a device that denies an attacker access to real network data, instead of revealing bogus network information.