TrustRadius: an HG Insights company

Zscaler Deception

Score8 out of 10

9 Reviews and Ratings

What is Zscaler Deception?

Zscaler Deception is a deception-based threat detection platform delivered as part of the Zscaler Zero Trust Exchange. This integrated capability uses decoys/honeypots to detect advanced in-network threats that have bypassed existing defenses. Organizations can use Zscaler Deception to detect compromised users, stop lateral movement, and defend against human-operated ransomware, hands-on keyboard threats, supply chain attacks, and malicious insiders.


What can Zscaler Deception do?


Detect pre-breach attacks
- Get alerted when targeted threat actors are scoping out an environment before mounting an attack. Block these threats and use telemetry to correlate for presence of attacker activity in the environment.


Detect compromised users - Decoy passwords, cookies, sessions, and bookmarks to decoy applications to detect compromised users when an attacker uses one of these deceptive assets.


Identity use of stolen credentials - Decoy web apps resembling vulnerable testbed applications and remote access services, like VPN, intercept attackers using stolen credentials to log in.


Detect privilege escalation - Detect and block adversaries that have compromised the environment and are now enumerating Active Directory to find high value targets for privilege escalation.


Key Capabilities Include:

  • GenAI Decoys: Uses decoy chatbots, decoys LLM APIs, adaptive decoys, and decoy agents to detect attackers targeting GenAI infrastructure in an environment.
  • Threat Intelligence Deception: Uses internet-facing decoys to detect pre-breach threats specifically targeting the organization.
  • Endpoint Deception: Plant a minefield to protect endpoints with decoy files, credentials, and processes.
  • Cloud Deception: Detects lateral movement in cloud environments with decoy web and file servers, and databases.
  • ThreatParse: Extracts insights from context-rich logs, and offers automated forensics and root cause analysis in two clicks.
  • Application Deception: Deploys decoy server systems that host services like SSH servers, databases, and file shares.
  • Active Directory Deception: Detects enumeration activity and malicious access with fake users in Active Directory.
  • RDP Decoys: Offers deeper attack visibility in realistic, highly interactive decoy OS environments.

Categories & Use Cases

Awards

Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards

Videos

Screenshots

Deception: A complete cyber deception platform

Technical Details

Technical Details
Deployment TypesSaaS, SaaS
Mobile ApplicationNo

FAQs

What is Zscaler Deception?
Zscaler Deption is a solution designed to detect sophisticated threats that bypass traditional defenses with the world's only zero trust platform with integrated deception capabilities.
What are Zscaler Deception's top competitors?
Proofpoint Shadow, Acalvio ShadowPlex, and FortiDeceptor are common alternatives for Zscaler Deception.