About This Service
Deception technology is a cybersecurity defense practice that aims to deceive attackers by distributing a collection of traps and decoys across a system's infrastructure to imitate genuine assets. If an intruder triggers a decoy, then the server will log and monitor the attack vectors utilized throughout the duration of the engagement.
Service1: Deception Technology Implementation
This service involves the architecture and deployment of decoy infrastructure across your infrastructure which will help in detecting intruders and their methods in your network.
Service 2: Deception Technology AMC
This service provides you with an annual maintenance contract which covers monthly backup and recovery of your deception infrastructure, including troubleshooting and configuration changes as and when required.
Service 3: Deception Technology Training
I provide the necessary training to get your analysts to understand the role of deception technology in the environment and how it can be used against intruders in detecting, containing and eradicating threats from the network.
What seller need from the Buyer to get started?
All the infrastructure whether virtual or physical has to be purchased by the buyer.
This will cover RBI's mandate of deception technology to be implemented in the environment.