{"id":259,"date":"2023-05-10T11:31:52","date_gmt":"2023-05-10T09:31:52","guid":{"rendered":"https:\/\/endorsec.com\/deception-technology\/"},"modified":"2023-05-11T19:31:42","modified_gmt":"2023-05-11T17:31:42","slug":"deception-technology","status":"publish","type":"page","link":"https:\/\/endorsec.com\/en\/deception-technology\/","title":{"rendered":"Deception Technology"},"content":{"rendered":"\n<p>Deception Technology is a new and innovative way to improve your security posture. It involves creating decoys that mimic your actual systems and make it difficult for attackers to determine which systems are real and which are not. This way, attackers waste their time and resources trying to take over the decoys while you stay protected and can already respond to the attacks.<\/p>\n\n<p>Our team of experts can help you implement and manage a Deception Technology to ensure your organization stays one step ahead of attackers. Our services include:<\/p>\n\n<ul class=\"wp-block-list\">\n<li>Deception Technology Consulting: we assess your organization&#8217;s security posture and recommend the best Deception Technology for your needs.<\/li>\n\n\n\n<li>Deception Technology Deployment: We deploy the Deception Technology, configure the decoys, and integrate it with your existing security systems such as SIEM for alerting.<\/li>\n\n\n\n<li>Deception Technology Management: We monitor and maintain the Deception Technology to ensure it is always up to date and functioning optimally.<\/li>\n<\/ul>\n\n<p>We understand that every business is different, so we tailor our services to your specific needs. Our goal is to help you stay protected from cyber threats, and our Deception Technology services are just one of the many ways we can do that.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Deception Technology is a new and innovative way to improve your security posture. It involves creating decoys that mimic your actual systems and make it difficult for attackers to determine &#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-259","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Deception Technology - endorsec.com<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/endorsec.com\/en\/deception-technology\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Deception Technology - endorsec.com\" \/>\n<meta property=\"og:description\" content=\"Deception Technology is a new and innovative way to improve your security posture. It involves creating decoys that mimic your actual systems and make it difficult for attackers to determine ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/endorsec.com\/en\/deception-technology\/\" \/>\n<meta property=\"og:site_name\" content=\"endorsec.com\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-11T17:31:42+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/endorsec.com\/en\/deception-technology\/\",\"url\":\"https:\/\/endorsec.com\/en\/deception-technology\/\",\"name\":\"Deception Technology - endorsec.com\",\"isPartOf\":{\"@id\":\"https:\/\/endorsec.com\/en\/#website\"},\"datePublished\":\"2023-05-10T09:31:52+00:00\",\"dateModified\":\"2023-05-11T17:31:42+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/endorsec.com\/en\/deception-technology\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/endorsec.com\/en\/deception-technology\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/endorsec.com\/en\/deception-technology\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/endorsec.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Deception Technology\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/endorsec.com\/en\/#website\",\"url\":\"https:\/\/endorsec.com\/en\/\",\"name\":\"endorsec.com\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/endorsec.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/endorsec.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/endorsec.com\/en\/#organization\",\"name\":\"Endorsec GmbH\",\"url\":\"https:\/\/endorsec.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/endorsec.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/endorsec.com\/wp-content\/uploads\/2023\/02\/Endorsec-Dark-bg.png\",\"contentUrl\":\"https:\/\/endorsec.com\/wp-content\/uploads\/2023\/02\/Endorsec-Dark-bg.png\",\"width\":5592,\"height\":1522,\"caption\":\"Endorsec GmbH\"},\"image\":{\"@id\":\"https:\/\/endorsec.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/linkedin.com\/company\/endorsec\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Deception Technology - endorsec.com","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/endorsec.com\/en\/deception-technology\/","og_locale":"en_US","og_type":"article","og_title":"Deception Technology - endorsec.com","og_description":"Deception Technology is a new and innovative way to improve your security posture. It involves creating decoys that mimic your actual systems and make it difficult for attackers to determine ...","og_url":"https:\/\/endorsec.com\/en\/deception-technology\/","og_site_name":"endorsec.com","article_modified_time":"2023-05-11T17:31:42+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/endorsec.com\/en\/deception-technology\/","url":"https:\/\/endorsec.com\/en\/deception-technology\/","name":"Deception Technology - endorsec.com","isPartOf":{"@id":"https:\/\/endorsec.com\/en\/#website"},"datePublished":"2023-05-10T09:31:52+00:00","dateModified":"2023-05-11T17:31:42+00:00","breadcrumb":{"@id":"https:\/\/endorsec.com\/en\/deception-technology\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/endorsec.com\/en\/deception-technology\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/endorsec.com\/en\/deception-technology\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/endorsec.com\/en\/"},{"@type":"ListItem","position":2,"name":"Deception Technology"}]},{"@type":"WebSite","@id":"https:\/\/endorsec.com\/en\/#website","url":"https:\/\/endorsec.com\/en\/","name":"endorsec.com","description":"","publisher":{"@id":"https:\/\/endorsec.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/endorsec.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/endorsec.com\/en\/#organization","name":"Endorsec GmbH","url":"https:\/\/endorsec.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/endorsec.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/endorsec.com\/wp-content\/uploads\/2023\/02\/Endorsec-Dark-bg.png","contentUrl":"https:\/\/endorsec.com\/wp-content\/uploads\/2023\/02\/Endorsec-Dark-bg.png","width":5592,"height":1522,"caption":"Endorsec GmbH"},"image":{"@id":"https:\/\/endorsec.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/linkedin.com\/company\/endorsec"]}]}},"_links":{"self":[{"href":"https:\/\/endorsec.com\/en\/wp-json\/wp\/v2\/pages\/259","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/endorsec.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/endorsec.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/endorsec.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/endorsec.com\/en\/wp-json\/wp\/v2\/comments?post=259"}],"version-history":[{"count":1,"href":"https:\/\/endorsec.com\/en\/wp-json\/wp\/v2\/pages\/259\/revisions"}],"predecessor-version":[{"id":260,"href":"https:\/\/endorsec.com\/en\/wp-json\/wp\/v2\/pages\/259\/revisions\/260"}],"wp:attachment":[{"href":"https:\/\/endorsec.com\/en\/wp-json\/wp\/v2\/media?parent=259"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}