{"id":516124,"date":"2024-06-05T16:08:25","date_gmt":"2024-06-05T20:08:25","guid":{"rendered":"https:\/\/www.commvault.com\/?post_type=cmv_glossary&p=516124"},"modified":"2024-06-05T17:53:38","modified_gmt":"2024-06-05T21:53:38","slug":"cyber-deception","status":"publish","type":"cmv_glossary","link":"https:\/\/www.commvault.com\/glossary-library\/cyber-deception","title":{"rendered":"Cyber Deception"},"content":{"rendered":"\n
\n\t
\n\t\t
\n\t\t\t
\n\t\t\t\t
<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t
\n\t\t<\/div>\n\t\t
\n\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\n\n

What is cyber deception?<\/h2>\n\n\n\n

Cyber deception is a proactive security and defense tactic which hinges on deceiving bad actors and malicious attacks.

Industry-leading cyber deception solutions pick up where conventional security tools leave off \u2013 employing at two-step process to slow down and surface unknown and zero-day threats. First, using decoys, bad actors or intrusive malware are diverted toward engaging look-a-like, fake assets.

Once engaged with, high fidelity alerts are immediately sent to key stakeholders and security systems, flagging ongoing threats before they reach or compromise actual systems or data.<\/p>\n\n\n\n

How does cyber deception help combat ransomware?<\/h2>\n\n\n\n

Cyberthreats have reached record highs and are continuing to expand in both scope and sophistication, with one goal in mind \u2013 compromise your systems and your data. And while encryption is still a primary focal point for ransomware gangs, bad actors have evolved, employing double and triple extortion tactics to exploit businesses data. In fact, over 83% of ransomware attacks today involve some form of data leakage, exfiltration, or theft. Put differently, most ransomware threats aren\u2019t just focus on holding your data hostage but monetizing it in new ways.<\/p>\n\n\n\n

Cyber deception arms today\u2019s businesses with early warning signals into ransomware attacks. While conventional security tools aim to harden and fortify your perimeter from threats, cyber deception actively defends against threats that have successfully bypassed or breached customer environments. <\/p>\n\n\n\n

Using sophisticated decoys, cyber deception solutions engage bad actors the moment an attack begins. This delivers a multi-layered defense against ongoing attacks, equipping businesses with capabilities to immediately divert and spot silent threats \u2013 before data is lost, damaged, or compromised.<\/p>\n\n\n\n

\n
\n
\n
\n

Want to see data protection in action? <\/h2>\n\n\n
\n
\"\"<\/figure><\/div>\n\n\n

See the fully functional, full-service product today, and see how Commvault can serve your needs directly.<\/p>\n\n\n\n

\n\n\t\n\t\t\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t<\/svg>\n\n\t\t\t\t\n\t\t\t\t\tGet a demo\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n
<\/div>\n\n\n\n

What is data exfiltration and leakage?<\/h2>\n\n\n\n

Ransomware gangs have shifted their approach. They no longer just settle for encrypting data \u2013 but seek larger payouts by comprising businesses and data in new ways. Now, the goal often is to extort data in multiple ways, by stealing, leaking, or damaging it along the way.<\/p>\n\n\n\n

Data exfiltration is when malware or bad actors enact an unauthorized data transfer from one device or system to another. This is a form of data theft that is also known as data extrusion or data exportation, which are infiltrated through a wide variety of means (such as phishing, etc.). Data leakage is another form of theft which occurs when transmission from within an organization is purposefully sent to an external source or recipient. Leakage can expose sensitive or valuable business data to unwarranted parties including nation states, public forums, and the dark web.<\/p>\n\n\n\n

In both instances, exfiltration and leakage present to new challenges and imperatives to safeguard data \u2013 beyond just recovering from post-encrypted states.<\/p>\n\n\n\n

<\/div>\n\n\n\n

What are threat sensors?<\/h2>\n\n\n\n

Threat sensors are a unique, central aspect to Commvault\u00ae<\/sup> ThreatWise\u2122<\/a> cyber deception capabilities.  Unlike honeypots, Threatwise threat sensors are designed to actively engage bad actors the moment an attack begins. Using a light-weight, webservice-like architecture, Commvault threat sensors are highly specialized, can mimic any customer asset, and can be rapidly deployed in minutes.

This floods customer environments with falsified digital assets that are indistinguishable to attackers.  They do not interfere with normal operations within an organization\u2019s network, but lure attackers in with decoys that divert and trick cyber attackers during recon, discovery, lateral movement, and more. When a bad actor touches a threat sensor, real-time high-fidelity alerts are directly passed to key stakeholders and security tools for remediation.

And because threat sensors are only visible to an attacker, businesses get highly precise notifications without false positives \u2013 for a direct line of sight into activity, attack paths, and techniques deployed.<\/p>\n\n\n\n

What are honeypots?<\/h2>\n\n\n\n

Honeypots<\/a> are a conventional form of threat detection. Rather than engaging an attacker, honeypots are designed to examine and learn from attackers and their attempts. Honeypots differ from threat sensors as they are traditionally leveraged to investigate and study how cybercriminals operate \u2013 not engage, surface, and divert ongoing attacks. Honeypots are commonly a network-attacked, full operating system \u2013 making them more resource-heavy to develop, monitor, and maintain.<\/p>\n\n\n\n

How is Commvault Threatwise different?<\/h2>\n\n\n\n

Commvault Threatwise<\/a> delivers integrated cyber deception across our award-winning DMaaS portfolio, to proactively defend data and enhances recoverability, before encryption, leakage, exfiltration, or damage. ThreatWise\u2122 combines game-changing, early warning alerts with rapid response capabilities to enable customers to neutralize otherwise undetected attacks before they cause any harm. Even the stealthiest zero-day attacks are detected and diverted despite their efforts to circumvent traditional detection tech and security controls.<\/p>\n\n\n\n

Other traditional solutions certainly provide baseline capabilities, but these only operate within backup environments and detect and deal with threats after it\u2019s already too late to completely safeguard the data. ThreatWise\u2122 enables organizations to immediately reveal latent and silent threats traversing network environments to neutralize ransomware activity before it reaches the target.<\/p>\n\n\n\n

This is truly unique pre-attack identification and containment, redefining the data protection market. Commvault is the single solution capable of identifying, deceiving, and recovering from threats across your data estate. <\/p>\n\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\n\n

\n\t
\n\t\t
\n\t\t\t\n\n
\n\t\n\t
\n\t\t
\n\t\t\t\t\t\t\t\t\t\t

\n\t\t\t\t\t\tCyber Deception:
Why staying one step ahead is crucial to first-class security\t\t\t\t<\/h2>\n\t\t\t\n\t\t\t\t\t\t\t

\n\t\t\t\t\tHow cyber deception can help augment organizations\u2019 incident detection and response strategies.\t\t\t\t<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t

\n\t\t\t\t\n\n
\n\n\t\n\t\t\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t<\/svg>\n\n\t\t\t\t\n\t\t\t\t\tLearn more\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n<\/div>\n\n\n\n
<\/div>\n\n\n\n
\n\t\n\t
\n\t\t
\n\t\t\t\t\t\t\t\t\t\t

\n\t\t\t\t\t\tEarly Threat Detection with Threatwise\t\t\t\t<\/h2>\n\t\t\t\n\t\t\t\t\t\t\t

\n\t\t\t\t\tAs adversaries aiming to steal your data early threat detection has never been more important.\t\t\t\t<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t

\n\t\t\t\t\n\n
\n\n\t\n\t\t\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t<\/svg>\n\n\t\t\t\t\n\t\t\t\t\tLearn more\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n<\/div>\n\n\n\n

Quick Links<\/h4>\n\n\n\n