Security technologies that create decoy systems, data, or network resources to detect unauthorized access attempts and insider threat activities.
Detailed Explanation
Deception technology enhances insider threat detection by creating honeypots, decoy files, and fake credentials that alert security teams when accessed. This provides early warning of insider reconnaissance activities and data exfiltration attempts without impacting legitimate business operations.