During the past, security technologies have largely focused on detection and blocking mechanisms to respond to attacks. Security of course must continuously evolve to detect and defend against attacker strategies, and these past strategies must continue to include new capabilities as well as old to properly defend against the array of attack techniques. A new emerging technology response capability is to “deceive” as a response.
The future of security will incorporate defense in depth, detection in depth, contextually aware adaptive response and increasingly leverage offensive misdirection and deception techniques with the goal of overwhelming and delaying attacker activities. Providers of deception and misdirection techniques are emerging while these same capabilities in some existing security products. Using attacker deceptions as a response strategy will have a game-changing effect on hacker attack campaigns.
In 2015, the Gartner TSP Security Solutions team will evaluate this emerging class of response capabilities and providers that offer them throughout the security market. We will also explore how existing security technologies can evolve to incorporate some of these response capabilities. Keep on the lookout for the TSP Security Solutions Agenda Overview for 2015 and track this emerging area of research.
Read Complimentary Relevant Research
Five Golden Rules for Creating Effective Security Policy
Policy writing is a risk communication exercise that is frequently performed by people who lack the skills needed to create good security...
View Relevant Webinars
Fundamental Principles of Software Asset Management
Whether you've got too much software or not enough, uncontrolled software costs are a drain on your IT department, consuming resources...
Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Gartner, Inc. or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes, with attribution to Gartner. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Gartner shall not be liable for any damages whatsoever arising out of the content or use of this blog.