Internet security technology Early detection of internal, external, and unknown attacks. Early detection sensors. Increased network protection against intrusions. Enables early warning and detection to divert and confine attacks.
Symantec Decoy Server
Every action is recorded for analysis, allowing administrators to prioritize and understand the threat and respond appropriately. The ability to shut down systems based on attacker activity A fully functioning server, and can simulate email traffic between users in the organization to mirror the appearance of a live mail server