Introducing G2.ai, the future of software buying.Try now
Tracebit
Sponsored
Tracebit
Visit Website
Product Avatar Image
FortiDeceptor

By Fortinet

Unclaimed Profile

Claim your company’s G2 profile

Claiming this profile confirms that you work at FortiDeceptor and allows you to manage how it appears on G2.

    Once approved, you can:

  • Update your company and product details

  • Boost your brand's visibility on G2, search and LLMs

  • Access insights on visitors and competitors

  • Respond to customer reviews

  • We’ll verify your work email before granting access.

Claim Now
4.0 out of 5 stars
5 star
0%
3 star
0%
2 star
0%
1 star
0%

How would you rate your experience with FortiDeceptor?

Tracebit
Sponsored
Tracebit
Visit Website
It's been two months since this profile received a new review
Leave a Review

FortiDeceptor Reviews & Product Details

Product Avatar Image

Have you used FortiDeceptor before?

Answer a few questions to help the FortiDeceptor community

FortiDeceptor Reviews (1)

Reviews

FortiDeceptor Reviews (1)

4.0
1 reviews

Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Oscar Charbel M.
OM
Small-Business (50 or fewer emp.)
"FortiDeceptor"
What do you like best about FortiDeceptor?

I really like the way it detects attacks that are occurring within the network and the prompt and correct way in which it responds. The menus and charts make so easy to find out what is happening Review collected by and hosted on G2.com.

What do you dislike about FortiDeceptor?

Many times the way to follow up on an incident is somewhat difficult to carry out, also in the matter of sending an attack to quarantine is a bit complicated as long as it has not been done automatically Review collected by and hosted on G2.com.

There are not enough reviews of FortiDeceptor for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Cynet - All-in-One Cybersecurity Platform Logo
Cynet - All-in-One Cybersecurity Platform
4.7
(246)
AutoXDR™ converges multiple technologies (EPP, EDR, UBA, Deception, Network Analytics and vulnerability management), with a 24/7 cyber SWAT team, to provide unparalleled visibility and defend all domains of your internal network: endpoints, network, files and users, from all types of attacks.
2
SentinelOne Singularity Endpoint Logo
SentinelOne Singularity Endpoint
4.7
(193)
Stop known and unknown threats on all platforms using sophisticated machine learning and intelligent automation. SentinelOne predicts malicious behavior across all vectors, rapidly eliminates threats with a fully-automated incident response protocol, and adapts defenses against the most advanced cyber attacks.
3
BOTsink Logo
BOTsink
4.0
(2)
The Attivo BOTsink solution stands guard inside your network, using high-interaction deception and decoy technology to lure attackers into engaging and revealing themselves.
4
DeceptionGrid Logo
DeceptionGrid
(1)
DeceptionGrid automates the deployment of a network of camouflaged malware traps that are intermingled with your real information technology resources.
5
Labyrinth Cyber Deception Platform Logo
Labyrinth Cyber Deception Platform
4.9
(16)
Labyrinth creates the illusion of a real infrastructure vulnerability for an attacker. The solution is based on Points, a smart host simulation. Each part of the simulation environment reproduces the services and content of an actual network segment. The system consists of four components that interact with each other. The main components of the Platform are: Admin VM is the main component. All collected information is sent to it for analysis. The console notifies the security team and sends the necessary data to third-party systems. Worker a host/virtual machine for deploying a set of Labyrinth network decoys (Points) on it. It can work in several VLANs simultaneously. Several Worker hosts can be connected to the same management console simultaneously. Points are intelligent hosts that mimic software services, content, routers, devices, etc. Points detect all malicious activities within the corporate network, providing complete coverage of all possible attack vectors. Seeder agents deployed on servers and workstations imitate the most attractive file artifacts for an attacker. By creating various decoy files, the agent directs attackers to network decoys (Points) through their contents. The Platform automatically deploys points (decoys) in the IT/OT network based on information about services and devices in the network environment. In addition, decoys can be deployed manually, providing users with a powerful tool to develop their unique deception platform based on their specific needs and best practices. The Labyrinth provokes an attacker to act and detects suspicious activity. As the attacker passes through the fake target infrastructure, the Platform captures all the details of the enemy. The security team receives information about the sources of threats, the tools used, the vulnerabilities exploited, and the attacker's behavior. At the same time, the entire real infrastructure continues to operate without any negative impact.
6
Smokescreen Logo
Smokescreen
4.0
(1)
Smokescreen was founded in 2015 to create the next generation of cyber-security detection and response systems. Our proprietary ILLUSIONBLACK platform detects, deflects and defeats advanced hackers in a manner that is false-positive free, and easy to implement. It effectively handles multiple avenues of attack and the limited response capabilities that most companies have.
7
ShadowPlex Logo
ShadowPlex
(0)
Acalvio provide an Advanced Defense solutions using a combination of Distributed Deception and Data Science technologies that allows security practitioners in detecting, engaging and responding to malicious activity with high precision in a timely and cost-effective fashion.
8
SentinelOne Singularity Hologram Logo
SentinelOne Singularity Hologram
4.2
(3)
Singularity Hologram™ is a network-based identity threat deception solution that lures both external and insider threat actors into revealing themselves. Hologram detects, misdirects, and isolates attackers that have established footholds in-network using decoys of production OSes, applications, and more. By engaging adversaries, you can block attacks, gain attacker intelligence, and build defenses.
9
Morphisec Logo
Morphisec
4.6
(12)
Morphisec Endpoint Threat Prevention thwarts hackers with their own strategies like deception, obfuscation, modification, and polymorphism.
10
Tracebit Logo
Tracebit
4.9
(12)
Tracebit generates and maintains tailored canary resources in your cloud environments, closing gaps in stock protection without time and cost intensive detection engineering.
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
FortiDeceptor
View Alternatives