White Paper

Deception Technology

Deception Technology

Pages 4 Pages

An integral part of the next generation SOC Deception Technology Table of Contents Executive Summary 2 Key Themes 2 1. Assuming Breach 3 2. Proactive Defence 3 3. Low False Positives 3 4. Data Analytics and Threat Intelligence 3 5. Orchestrated Response 4 6. Insider Threats 4DECEPTION - AN INTEGRAL PART OF THE NEXT-GEN SOC 2 ©2021 Zscaler, Inc. All rights reserved. Executive Summary With adversarial capabilities improving, greater than ever stakes around information security, and a fast evolving threat landscape, everyone wants a ‘next-gen SOC’. But what does that really mean? At its most basic, it involves evolving from simple log aggregation and static detection use-cases to a proactive, low false-positive detection model, with deep analytics to convert data to information, and f

Join for free to read