A Definitive
Market Guide to Deception Technology


The use of deception technology designed to throw off stealthy attackers from real assets and gather intelligence about how they operate is gaining ground in the enterprise. Although still not considered a mainstream defense, deception technology continues to gain acceptance among more forward-leaning security operations groups trying to get out ahead of attackers and keep them from doing serious damage.

In mid-2019 leading IT analyst firm Enterprise Management Associates (EMA) surveyed 208 respondents to gauge interest in, usage of, and concerns about deception technology from users of the technology, as well as those interested in it. The research uncovered interesting contrasts between deception technology users and non-users.  

Join Paula Musich, research director in the IT security and risk management practice at EMA, for a webinar that will explore the results of this study. 

The webinar will highlight:

  • Advantages, such as more accurate detection of attackers, a decrease in dwell time for users, and greater understanding of attackers’ methods
  • Use cases
  • Where deception fits in a defense strategy
  • How and where the technology is being used within the enterprise


By registering for this event, I agree to be contacted by EMA and EMA Research sponsors. I may unsubscribe at any time. Read EMA's Site Terms and Conditions.



Paula Musich
Research Director, EMA