TrustRadius: an HG Insights company

FortiDeceptor

Score10 out of 10

4 Reviews and Ratings

What is FortiDeceptor?

FortiDeceptor is a deception-based breach protection that helps users deceive, expose and eliminate external and internal threats.

Categories & Use Cases

FortiDeceptor-DECEIVE , EXPOSE & ELIMINATE THREATS

Use Cases and Deployment Scope

FortiDeceptor is the Concept of Honeypot & Threat Analytics & Threat Intelligent. Lure attackers to decoys that appear indistinguishable from real IT & OT assets & highly interactive. Centrally manage & automate deployments of decoy VMs(Windows, Linux, ICS/SCADA) and generations of lures (data, applications, Services) FortiDeceptor is designed to DECEIVE, EXPOSE and ELIMINATE external & internal attack kill chain & proactively block these threats before any significant damage occurs. Protect both IT & OT Devices, FortiDeceptor provides expansive decoy support to lure attacks away from IT & OT environments. Fortideceptor is Unintrusive & EasyIt is a Network based solution that creates a fake environment to stimulate the actual one. It is completely unintrusive -no requirement to take SCADA/ICS offline nor does it create any delay in operational duties.

Pros

  • Gain visibility of network-related attacks & laterals movements that could potentially bypass existing security in place.
  • Redirect attacks from existing critical platforms as well as sensitive data .
  • Early warning system to deal with threats.

Cons

  • FortiDeceptor works very well with FortiFabric environments, Where We need FortiSIEM & Other FortiGate NGFW, which could lead to a hike in IT Security Budget.
  • Reporting part needs to improve, Where again we have to buy a Forti analyzer for reporting part.

Return on Investment

  • FortiDeceptor is one of the best Deception technology available across the globe, With the best licensing policy ( Maximum Decoys based on Deception best practice -Four Decoy per VLAN).
  • Add-on-per VLAN(minimum quantity of two).
  • Day-1 operation via AI-based network and asset discovery & automated deployment of decoys.
  • Security Fabrics enables Fortideceptor integration with Fortinet & third-party security solutions to automate threat response.

Alternatives Considered

Rapid7 InsightIDR, Smokescreen IllusionBlack and from Zscaler

FortiDeceptor protects you... from everything!

Use Cases and Deployment Scope

FortiDeceptor protects our network from all aspects of malicious attacks. It's a proactive approach to Internet security rather than reacting as problems occur but putting up a giant roadblock to would-be attackers and stopping any major problems before they start. It's not overly complicated to use and does the job.

Pros

  • Protects against all types of malware.
  • Provides visibility to potential attacks to your network.
  • Blocks access to inappropriate websites.

Cons

  • The GUI for FortiDeceptor is very detailed but can be a little tricky to navigate with many options spread out in its menus.
  • The "attack map" gets points on its appearance but I'm not sure how useful it is as it's simply full of IP addresses and geographic locations.

Return on Investment

  • Internet security is a gamble. It's hard to know the cost of a "would-be" attack. FortiDeceptor is basically an insurance policy and for that, it is a great investment.

Alternatives Considered

Microsoft Defender for Endpoint (formerly Microsoft Defender ATP), Microsoft Endpoint Manager (Microsoft Intune + SCCM), Bitdefender GravityZone and Symantec Endpoint Security

Other Software Used

Palo Alto Networks Advanced URL Filtering, WatchGuard AuthPoint, Cisco Meraki MX

Solution for Air-gapped systems

Use Cases and Deployment Scope

The main reason we outsourced FortiDeceptor was to complement the existing Enterprise Security solution. This was because we realized the Enterprise Security and SOAR solutions only concentrate on attacks on the main assets (servers); so that in the event of an attack, lateral systems like CPUs are exposed. With FortiDeceptor, we however eliminate attacks on the lateral assets before significant damages.

Pros

  • Management is simple - centralized deployment.
  • Easy to deploy custom decoys for the Operational Technology.

Cons

  • FortiSandbox integration has limited/basic Next Generation Firewall (NGFW) capabilities.

Return on Investment

  • It deploys decoys automatically, saving us the manpower.
  • It has been the way to go for cybersecurity in our converged IT and OT environment.

Other Software Used

Splunk SOAR (Security Orchestration, Automation and Response) (formerly Phantom), Splunk Enterprise Security (ES)