{"id":6375,"date":"2025-04-02T12:18:18","date_gmt":"2025-04-02T10:18:18","guid":{"rendered":"https:\/\/opensight.indivontwikkelt.nl\/diensten\/overzicht\/cyber-deception\/"},"modified":"2025-09-03T11:11:39","modified_gmt":"2025-09-03T09:11:39","slug":"cyber-deception","status":"publish","type":"dienst","link":"https:\/\/opensight.indivontwikkelt.nl\/en\/services\/overview\/cyber-deception\/","title":{"rendered":"Cyber Deception"},"content":{"rendered":"<div class=\"wp-bootstrap-blocks-container container mb-2 px-4 px-md-0\">\n\t\n<div class=\"wp-bootstrap-blocks-row row\">\n\t\n\n<div class=\"col-12 col-md-2 offset-lg-1 d-none d-md-inline-block\">\n\t\t\t\n\n<figure class=\"wp-block-image size-large is-resized img-fluid\"><img loading=\"lazy\" decoding=\"async\" width=\"125\" height=\"144\" src=\"https:\/\/opensight.indivontwikkelt.nl\/content\/group-84.svg\" alt=\"\" class=\"wp-image-4842\" style=\"width:159px\"\/><\/figure>\n\n\t<\/div>\n\n\n\n<div class=\"col-12 col-md-8 col-lg-4\">\n\t\t\t\n\n<div class=\"wp-block-group single-hexagon-under-header-content\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<h2 class=\"wp-block-heading has-dark-blue-color has-text-color has-link-color wp-elements-302c37fe2685de0b0a4b68b21ae44e13\">What is Cyber Deception?<\/h2>\n\n\n\n<p>Cyber Deception is the creation of a number of vulnerable services within your digital environment to detect attacks early, even before it can launch an actual attack. These deceptions look like real servers, databases and shares, but feature intelligent technology to detect attackers and protect the environment from spreading. <\/p>\n<\/div><\/div>\n\n\t<\/div>\n\n<\/div>\n\n\n<div class=\"wp-bootstrap-blocks-row row justify-content-center\">\n\t\n\n<div class=\"col-12 col-md-10\">\n\t\t\t<div class=\"h-100 d-flex flex-column justify-content-start\">\n\t\t\t\n  <div class=\" indiv-block breakpoint-spacer\" style=\"--height-xxl: 21px;--height-xl: 21px;--height-lg: 21px;--height-md: 21px;--height-sm: 6px;--height-default: 6px;\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-left text-start text-md-center has-dark-blue-color has-text-color has-link-color wp-elements-0d080ff2dfa2bfbaff17f7070da066b5\">What do you achieve with Cyber Deception?<\/h2>\n\n\n\n<p>With this service, we offer your organisation the ability to detect attacks early, even before an actual attack is launched. Attackers will initially behave like a normal user and not immediately put an anti-malware solution to work. With Cyber Deception, you create triggers such as a look-a-like file server or critical database, which detect a snooping attacker. As a result, when combined with EDR and NDR, you achieve ultimate detection capability, for practically all attack vectors.    <\/p>\n\n\n  <div class=\"bs-button \">\n        <a class=\"btn btn-custom indiv-block bsbutton d-inline-block d-md-none\" href=\"https:\/\/opensight.indivontwikkelt.nl\/en\/request-a-demo\/\" target=\"_self\"> Request a demo<\/a>\n  <\/div>\n\n\t\t<\/div>\n\t<\/div>\n\n<\/div>\n\n\n  <div class=\" indiv-block breakpoint-spacer\" style=\"--height-xxl: 87px;--height-xl: 87px;--height-lg: 87px;--height-md: 87px;--height-sm: 37px;--height-default: 37px;\"><\/div>\n\n\n\n<div class=\"wp-block-group image-with-text\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-bootstrap-blocks-row row justify-content-center\">\n\t\n\n<div class=\"col-12 col-md-4\">\n\t\t\t<div class=\"h-100 d-flex flex-column justify-content-start\">\n\t\t\t\n\n<figure class=\"wp-block-image size-full z-2 position-relative overlapping-image-single\"><img loading=\"lazy\" decoding=\"async\" width=\"1600\" height=\"1067\" src=\"https:\/\/opensight.indivontwikkelt.nl\/content\/cyber-deception-3.webp\" alt=\"\" class=\"wp-image-6040\" srcset=\"https:\/\/opensight.indivontwikkelt.nl\/content\/cyber-deception-3.webp 1600w, https:\/\/opensight.indivontwikkelt.nl\/content\/cyber-deception-3-300x200.webp 300w, https:\/\/opensight.indivontwikkelt.nl\/content\/cyber-deception-3-1024x683.webp 1024w, https:\/\/opensight.indivontwikkelt.nl\/content\/cyber-deception-3-768x512.webp 768w, https:\/\/opensight.indivontwikkelt.nl\/content\/cyber-deception-3-1536x1024.webp 1536w\" sizes=\"auto, (max-width: 1600px) 100vw, 1600px\" \/><\/figure>\n\n\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"col-12 col-md-5 offset-md-1\">\n\t\t\t<div class=\"h-100 d-flex flex-column justify-content-start\">\n\t\t\t\n\n<div class=\"wp-block-group d-flex flex-column-reverse flex-md-column gap-3\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">  <div class=\" indiv-block breakpoint-spacer\" style=\"--height-xxl: 0px;--height-xl: 0px;--height-lg: 0px;--height-md: 0px;--height-sm: 33px;--height-default: 33px;\"><\/div>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Scalable Cyber Deception sensors out of the box.<\/li>\n\n\n\n<li>An early threat warning in an environment where you cannot implement an EDR solution.<\/li>\n\n\n\n<li>Create your own Cyber Deception sensor.<\/li>\n\n\n\n<li>Sensors visible only to attackers, so no confusion for your own teams.<\/li>\n\n\n\n<li>Full SIEM integration for actions based on your Cyber Deception.<\/li>\n\n\n\n<li>Your Cyber Resiliency already started even before you need it. <\/li>\n<\/ul>\n\n\n  <div class=\" indiv-block breakpoint-spacer\" style=\"--height-xxl: 14px;--height-xl: 14px;--height-lg: 14px;--height-md: 14px;--height-sm: 14px;--height-default: 14px;\"><\/div>\n\n\n  <div class=\"bs-button \">\n        <a class=\"btn btn-custom indiv-block bsbutton d-none d-md-inline-block\" href=\"https:\/\/opensight.indivontwikkelt.nl\/en\/request-a-demo\/\" target=\"_self\"> Request a demo<\/a>\n  <\/div>\n<\/div><\/div>\n\n\t\t<\/div>\n\t<\/div>\n\n<\/div>\n<\/div><\/div>\n\n<\/div>\n\n\n  <div class=\" indiv-block breakpoint-spacer\" style=\"--height-xxl: 0px;--height-xl: 0px;--height-lg: 0px;--height-md: 0px;--height-sm: 15px;--height-default: 15px;\"><\/div>\n\n\n  <div class=\"indiv-block diensten-single-background px-4 px-md-0 py-5\">\n      <div class=\"container\">\n          <div class=\"row justify-content-end\">\n              <div class=\"col-12 col-lg-5\">\n                  <div class=\" ps-4 ps-md-0 quote\">\n                    <p>\u201c<br \/>\nGet more <strong>control<\/strong> and <strong>insight<\/strong> into cyber risks<br \/>\n\u201c<\/p>\n                  <\/div>\n              <\/div>\n          <\/div>\n          <div class=\"row justify-content-start justify-content-md-center\">\n              <div class=\"col-12 col-md-10\">\n                  <div class=\"content\">\n                    \n  <div class=\" indiv-block breakpoint-spacer\" style=\"--height-xxl: 40px;--height-xl: 40px;--height-lg: 40px;--height-md: 40px;--height-sm: 0px;--height-default: 0px;\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-left\">What does Cyber Deception mean at OpenSight?<\/h2>\n\n\n\n<p>At OpenSight, we are committed to providing a secure environment for every person and every type of organisation. Not every organisation has the resources to deploy our EDR solution, but we do everything we can to minimise the impact of an attack. After all, what is prevented does not need to be repaired. So cyber resilience starts before you even have to think about recovery.   <\/p>\n\n\n                  <\/div>\n              <\/div>\n          <\/div>\n      <\/div>\n      <div class=\"background-hexagon-placement\">\n        <div class=\"d-none d-lg-flex image align-items-center\">\n                            <img decoding=\"async\" src=\"https:\/\/opensight.indivontwikkelt.nl\/wp-content\/themes\/opensight\/assets\/img\/hexagon-background-green.svg\" alt=\"\"  \/>\n                    <\/div>\n      <\/div>\n\n  <\/div>\n<div class=\"absolute-hexagon-image d-block d-md-none\">\n    <div class=\"d-block d-md-none image d-flex align-items-center\">\n                    <img decoding=\"async\" class=\"img-fluid\"  src=\"https:\/\/opensight.indivontwikkelt.nl\/wp-content\/themes\/opensight\/assets\/img\/hexagon-background-green.svg\" alt=\"\"  \/>\n            <\/div>\n<\/div>\n\n\n  <div class=\" indiv-block breakpoint-spacer\" style=\"--height-xxl: 100px;--height-xl: 100px;--height-lg: 100px;--height-md: 100px;--height-sm: 100px;--height-default: 100px;\"><\/div>\n\n\n<div class=\"wp-bootstrap-blocks-container container mb-2 px-4 px-md-0\">\n\t\n<div class=\"wp-bootstrap-blocks-row row justify-content-center\">\n\t\n\n<div class=\"col-12 col-lg-5\">\n\t\t\t\n\n<div class=\"wp-block-group square-image\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<figure class=\"wp-block-image size-full h-100\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"665\" src=\"https:\/\/opensight.indivontwikkelt.nl\/content\/cloud-protection.webp\" alt=\"\" class=\"wp-image-4987\" srcset=\"https:\/\/opensight.indivontwikkelt.nl\/content\/cloud-protection.webp 1000w, https:\/\/opensight.indivontwikkelt.nl\/content\/cloud-protection-300x200.webp 300w, https:\/\/opensight.indivontwikkelt.nl\/content\/cloud-protection-768x511.webp 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n<\/div><\/div>\n\n\t<\/div>\n\n\n\n<div class=\"col-12 col-lg-5 offset-lg-1\">\n\t\t\t\n  <div class=\" indiv-block breakpoint-spacer\" style=\"--height-xxl: 0px;--height-xl: 0px;--height-lg: 0px;--height-md: 0px;--height-sm: 16px;--height-default: 16px;\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-dark-blue-color has-text-color has-link-color wp-elements-09a94f7a880da07f3dcf6de4ecc3ffc9\">Want to know more about Cyber Deception?<\/h2>\n\n\n\n<p>Request a no-strings-attached demo and we are ready to explain our services and answer any questions.<\/p>\n\n\n  <div class=\" indiv-block breakpoint-spacer\" style=\"--height-xxl: 38px;--height-xl: 38px;--height-lg: 38px;--height-md: 38px;--height-sm: 4px;--height-default: 4px;\"><\/div>\n\n\n  <div class=\"bs-button \">\n        <a class=\"btn btn-custom indiv-block bsbutton\" href=\"https:\/\/opensight.indivontwikkelt.nl\/en\/request-a-demo\/\" target=\"_self\"> Request a demo<\/a>\n  <\/div>\n\n\t<\/div>\n\n<\/div>\n\n\n  <div class=\" indiv-block breakpoint-spacer\" style=\"--height-xxl: 100px;--height-xl: 100px;--height-lg: 100px;--height-md: 100px;--height-sm: 60px;--height-default: 60px;\"><\/div>\n\n<\/div>\n\n\n\n<div class=\"wp-block-group p-block-xl has-grey-background-color has-background\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-bootstrap-blocks-container container mb-2 indivaos_fade-up custom-home-padding\">\n\t\n<div class=\"wp-bootstrap-blocks-row row justify-content-center\">\n\t\n\n<div class=\"col-12 col-md-10 col-lg-9 col-xl-8 col-xxl-7\">\n\t\t\t\n<div class=\"wp-bootstrap-blocks-row row text-center text-md-start\">\n\t\n\n<div class=\"col-12 col-md-4 col-lg-3 order-md-last\">\n\t\t\t<div class=\"h-100 d-flex flex-column justify-content-center\">\n\t\t\t\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1626\" height=\"267\" src=\"https:\/\/opensight.indivontwikkelt.nl\/content\/commvault_idf8yw3ale_0.svg\" alt=\"\" class=\"wp-image-6273\"\/><\/figure>\n\n\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"col-12 col-md-8 col-lg-9\">\n\t\t\t\n\n<h2 class=\"wp-block-heading text-normal has-dark-blue-color has-text-color has-link-color wp-elements-788f9408282f71cb107a19c2aaea9290\" style=\"font-size:22px\">Commvault<\/h2>\n\n\n\n<p>This service is co-sponsored by Commvault, a leading data protection and data management company providing solutions for businesses of all sizes.<\/p>\n\n\n  <div class=\"bs-button \">\n        <a class=\"btn btn-primary indiv-block bsbutton btn-custom btn-minwidth\" href=\"https:\/\/opensight.indivontwikkelt.nl\/vendor\/commvault\/\" target=\"_self\"> More about Commvault<\/a>\n  <\/div>\n\n\t<\/div>\n\n<\/div>\n\n\t<\/div>\n\n<\/div>\n\n<\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cyber Deception; with today&#8217;s lightweight agents for Endpoint protection, it almost seems redundant. Yet we still get a lot of people asking about it. And when we get questions, it is time to create a solution. For this reason, we have developed our Cyber Deception service. So what exactly does it do? Well, exactly what you&#8217;d expect, actually. We create a deception in your digital environment.      <\/p>\n","protected":false},"featured_media":6039,"template":"","campagne_categorie":[95,72],"class_list":["post-6375","dienst","type-dienst","status-publish","has-post-thumbnail","hentry","campagne_categorie-commvault-en","campagne_categorie-technology-en"],"acf":[],"_links":{"self":[{"href":"https:\/\/opensight.indivontwikkelt.nl\/en\/wp-json\/wp\/v2\/dienst\/6375","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/opensight.indivontwikkelt.nl\/en\/wp-json\/wp\/v2\/dienst"}],"about":[{"href":"https:\/\/opensight.indivontwikkelt.nl\/en\/wp-json\/wp\/v2\/types\/dienst"}],"version-history":[{"count":3,"href":"https:\/\/opensight.indivontwikkelt.nl\/en\/wp-json\/wp\/v2\/dienst\/6375\/revisions"}],"predecessor-version":[{"id":7439,"href":"https:\/\/opensight.indivontwikkelt.nl\/en\/wp-json\/wp\/v2\/dienst\/6375\/revisions\/7439"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/opensight.indivontwikkelt.nl\/en\/wp-json\/wp\/v2\/media\/6039"}],"wp:attachment":[{"href":"https:\/\/opensight.indivontwikkelt.nl\/en\/wp-json\/wp\/v2\/media?parent=6375"}],"wp:term":[{"taxonomy":"campagne_categorie","embeddable":true,"href":"https:\/\/opensight.indivontwikkelt.nl\/en\/wp-json\/wp\/v2\/campagne_categorie?post=6375"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}