|
|
|
|
A Non-Intrusive, Agentless Deception Solution to Detect and Stop Active In-Network Attacks FortiDeceptor is Fortinet's non-intrusive, agentless deception platform that puts the power back into the hand of defenders, with the ability to deceive attackers into engaging with fake assets and ultimately revealing themselves. A force multiplier to current security defenses, FortiDeceptor combines the concept of honeypot with threat analytics and threat mitigation capabilities. This is achieved by distributing a layer of deception assets across the network-decoys and tokens, such as fake keys and files on endpoints and servers-and creating a system of traps that look and operate like any other real asset across IT, OT, and IoT networks, intended to deceive, detect, and isolate known and unknown human and automated attacks. With FortiDeceptor, instead of waiting for the threat actor to make a mistake and then detect their presence, you can now embrace an active defense approach where any step the attacker takes-whether they try to escalate privileges or run malware-becomes an opportunity for you to detect them. Early Threat Detection, Minimal Network Impact FortiDeceptor works by deploying and running decoys from the FortiDeceptor console using available IP addresses. As decoys leverage unused IP addresses across the different network segments, they do not impact network availability and, to the attacker, they seem like an integral part on your network. These IP addresses do not correspond to any real host or device on the network. The FortiDeceptor platform consists of several deception components that together provide an authentic and scalable layer of deception assets that are identical to other assets across your network. These decoys are fake assets, such as industrial control systems, medical devices, ATMs, tank gauges, POS devices, IoT devices, network infrastructure, and more, that run real operating systems and services and generate fake but limited traffic to lure attackers to them, diverting them away from sensitive assets. FortiDeceptor provides an extensive inventory of decoys. You can also 'bring your own decoys' and upload your own golden images. To expand the deception layer event further, FortiDeceptor places breadcrumbs (or tokens) on real endpoints and servers. These are fake documents, files, or fake credentials, that attackers look to leverage to move laterally or encrypt. The breadcrumbs, which are indistinguishable from real files and credentials, are designed to deceive the attacker or malware to laterally move to the decoy. FortiDeceptor immediately detects any use of fake credentials, generates alerts, and automatically isolates the endpoint using built-in endpoint isolation capabilities or security orchestration, automation, and response (SOAR) playbooks. Accelerated Incident Response The solution generates high-fidelity, zero false-positive alerts, providing security teams with a unique advantage over malicious activity, and unparalleled visibility to detect and stop attacks, credential thefts, lateral movement, and malware activity. It also provides compensating security control when patching or when other security controls aren't an option. A good example of this is in OT environments where patches aren't available; even when patches are available, the time and effort required for maintenance is arduous.
-
General Information Manufacturer: Fortinet, Inc Manufacturer Part Number: FDR100G Manufacturer Website Address: http://www.fortinet.com Brand Name: Fortinet Product Line: FortiDeceptor Product Model: FDR-100G Product Name: FortiDeceptor FDR-100G Network Security Appliance Marketing Information: A Non-Intrusive, Agentless Deception Solution to Detect and Stop Active In-Network Attacks FortiDeceptor is Fortinet's non-intrusive, agentless deception platform that puts the power back into the hand of defenders, with the ability to deceive attackers into engaging with fake assets and ultimately revealing themselves. A force multiplier to current security defenses, FortiDeceptor combines the concept of honeypot with threat analytics and threat mitigation capabilities. This is achieved by distributing a layer of deception assets across the network-decoys and tokens, such as fake keys and files on endpoints and servers-and creating a system of traps that look and operate like any other real asset across IT, OT, and IoT networks, intended to deceive, detect, and isolate known and unknown human and automated attacks. With FortiDeceptor, instead of waiting for the threat actor to make a mistake and then detect their presence, you can now embrace an active defense approach where any step the attacker takes-whether they try to escalate privileges or run malware-becomes an opportunity for you to detect them. Early Threat Detection, Minimal Network Impact FortiDeceptor works by deploying and running decoys from the FortiDeceptor console using available IP addresses. As decoys leverage unused IP addresses across the different network segments, they do not impact network availability and, to the attacker, they seem like an integral part on your network. These IP addresses do not correspond to any real host or device on the network. The FortiDeceptor platform consists of several deception components that together provide an authentic and scalable layer of deception assets that are identical to other assets across your network. These decoys are fake assets, such as industrial control systems, medical devices, ATMs, tank gauges, POS devices, IoT devices, network infrastructure, and more, that run real operating systems and services and generate fake but limited traffic to lure attackers to them, diverting them away from sensitive assets. FortiDeceptor provides an extensive inventory of decoys. You can also 'bring your own decoys' and upload your own golden images. To expand the deception layer event further, FortiDeceptor places breadcrumbs (or tokens) on real endpoints and servers. These are fake documents, files, or fake credentials, that attackers look to leverage to move laterally or encrypt. The breadcrumbs, which are indistinguishable from real files and credentials, are designed to deceive the attacker or malware to laterally move to the decoy. FortiDeceptor immediately detects any use of fake credentials, generates alerts, and automatically isolates the endpoint using built-in endpoint isolation capabilities or security orchestration, automation, and response (SOAR) playbooks. Accelerated Incident Response The solution generates high-fidelity, zero false-positive alerts, providing security teams with a unique advantage over malicious activity, and unparalleled visibility to detect and stop attacks, credential thefts, lateral movement, and malware activity. It also provides compensating security control when patching or when other security controls aren't an option. A good example of this is in OT environments where patches aren't available; even when patches are available, the time and effort required for maintenance is arduous. Product Type: Network Security Appliance Technical Information Functionality: Active In-Network Attacks Protection Firewall Protection Supported: - Threat Protection
- IoT Security
Encryption Standard: SSL Interfaces/Ports Total Number of Ports: 6 Number of Network (RJ-45) Ports: 6 Network & Communication Ethernet Technology: Gigabit Ethernet Network Standard: 10/100/1000Base-T Power Description Power Consumption: 73.92 kW Physical Characteristics Form Factor: Desktop Height: 3.9" Width: 10.8" Depth: 8.9" Weight (Approximate): 16.63 lb Warranty Limited Warranty: 1 Year
Dedicated account managers are available to assist you with purchasing and presales questions at 877-712-2230 Monday through Friday 8-5pm. What Forms Of Payment Do We Take?We accept all forms of payment including Visa, Mastercard, American Express, Discover, Wire Transfer, and Check in Advance. Purchase orders are accepted and net terms are given based on a credit check. Why Buy From ITO?ITO Solutions, Inc. purpose is to provide you, our client, with best in class technology solutions to help you run your network efficiently by leveraging our integrity, partnerships, and years of experience within the IT industry. Our account managers are here to answer your questions and provide you with solutions very effectively.
|
|
|
|
|
|
|
|
|
|
|
|
|
Key Features
Product Description
A Non-Intrusive, Agentless Deception Solution to Detect and Stop Active In-Network Attacks FortiDeceptor is Fortinet's non-intrusive, agentless deception platform that puts the power back into the hand of defenders, with the ability to deceive attackers into engaging with fake assets and ultimately revealing themselves. A force multiplier to current security defenses, FortiDeceptor combines the concept of honeypot with threat analytics and threat mitigation capabilities. This is achieved by distributing a layer of deception assets across the network-decoys and tokens, such as fake keys and files on endpoints and servers-and creating a system of traps that look and operate like any other real asset across IT, OT, and IoT networks, intended to deceive, detect, and isolate known and unknown human and automated attacks. With FortiDeceptor, instead of waiting for the threat actor to make a mistake and then detect their presence, you can now embrace an active defense approach where any step the attacker takes-whether they try to escalate privileges or run malware-becomes an opportunity for you to detect them. Early Threat Detection, Minimal Network Impact FortiDeceptor works by deploying and running decoys from the FortiDeceptor console using available IP addresses. As decoys leverage unused IP addresses across the different network segments, they do not impact network availability and, to the attacker, they seem like an integral part on your network. These IP addresses do not correspond to any real host or device on the network. The FortiDeceptor platform consists of several deception components that together provide an authentic and scalable layer of deception assets that are identical to other assets across your network. These decoys are fake assets, such as industrial control systems, medical devices, ATMs, tank gauges, POS devices, IoT devices, network infrastructure, and more, that run real operating systems and services and generate fake but limited traffic to lure attackers to them, diverting them away from sensitive assets. FortiDeceptor provides an extensive inventory of decoys. You can also 'bring your own decoys' and upload your own golden images. To expand the deception layer event further, FortiDeceptor places breadcrumbs (or tokens) on real endpoints and servers. These are fake documents, files, or fake credentials, that attackers look to leverage to move laterally or encrypt. The breadcrumbs, which are indistinguishable from real files and credentials, are designed to deceive the attacker or malware to laterally move to the decoy. FortiDeceptor immediately detects any use of fake credentials, generates alerts, and automatically isolates the endpoint using built-in endpoint isolation capabilities or security orchestration, automation, and response (SOAR) playbooks. Accelerated Incident Response The solution generates high-fidelity, zero false-positive alerts, providing security teams with a unique advantage over malicious activity, and unparalleled visibility to detect and stop attacks, credential thefts, lateral movement, and malware activity. It also provides compensating security control when patching or when other security controls aren't an option. A good example of this is in OT environments where patches aren't available; even when patches are available, the time and effort required for maintenance is arduous.
- Functionality: Active In-Network Attacks Protection
- Firewall Protection Supported: Threat Protection, IoT Security
- Encryption Standard: SSL
- Total Number of Ports: 6
- Number of Network (RJ-45) Ports: 6
- Ethernet Technology: Gigabit Ethernet
- Network Standard: 10/100/1000Base-T
- Power Consumption: 73.92 kW
- Form Factor: Desktop
- Height: 3.9"
- Width: 10.8"
- Depth: 8.9"
- Weight (Approximate): 16.63 lb
- Limited Warranty: 1 Year
|
|
|
|
|
|
|