Security News
10 Emerging Security Technologies Gaining Interest, Adoption
Robert Westervelt
Honey Pots have been around for years, but security experts say the technology is being made more widely available in an attempt to thwart attackers. Decoy documents and bogus systems can be set up to make attacks take longer, providing a greater chance detection systems will trigger. Accenture cited two firms, New York City-based Allure Security Technology, which uses decoy documents to track attackers, and Tempe, Ariz.-based DataSoft, which offers a device that denies an attacker access to real network data, instead of revealing bogus network information.
Learn More:
Top 10 security technologies |
emerging security technologies |
security startups |
Top security defenses |
gartner |