Deception technologies essentially create decoys, traps that emulate natural systems. They trick attackers into thinking they are infiltrating assets of value or accessing valuable data. They also provide security teams with the tools, techniques, and procedures their adversaries are employing. Deception technology can also work with IoT devices, such as point of sale systems, medical devices, and more. The information deception technologies gathered are invaluable to the security operations center, incident response teams, and threat hunters, and other security tools.”]
Source: https://www.csoonline.com/article/3596076/5-top-deception-tools-and-how-they-ensnare-attackers.html

