Zscaler Deception is a deception-based threat detection platform delivered as part of the Zscaler Zero Trust Exchange. This integrated capability uses decoys/honeypots to detect advanced in-network threats that have bypassed existing defenses.
Organizations use Zscaler Deception to detect compromised users, stop lateral movement, and defend against human-operated ransomware, hands-on keyboard threats, supply chain attacks, and malicious insiders.
Key Features and Benefits:
• Recognize pre-breach attacks: Get high fidelity alerts when targeted threat actors are scoping out your environment before mounting an attack. Block these threats and use telemetry to correlate for presence of attacker activity in your environment.
• Detect compromised users: Utilize decoy passwords, cookies, sessions, and bookmarks to decoy applications to uncover compromised users should an attacker use one of these deceptive assets.
• Identity use of stolen credentials: Decoy web apps resembling vulnerable testbed applications and remote access services, like VPN, intercept attackers using stolen credentials to log in.
• Uncover privilege escalation: Detect and block adversaries that have compromised your environment and are now enumerating Active Directory to find high value targets for privilege escalation. "