Fortinet FortiDeceptor 100G

FortinetSKU: FDR-100G

Price:
Sale price$43,283.58

Description

Here's the FortiDeceptor description reformatted to match that style:


FortiDeceptor — Agentless Deception Platform to Detect and Stop In-Network Attacks

FortiDeceptor is a non-intrusive deception security platform that deploys fake assets across your network to lure, expose, and isolate attackers — delivering zero false-positive alerts with no network topology changes required.

Key Performance

  • Zero false-positive alerts
  • Eight built-in forensic intelligence engines
  • Supports up to 20 Deception VMs
  • Up to 128 network VLANs
  • One-day deployment, no network changes required

Hardware Variants

  • FortiDeceptor 1000G — 1RU rackmount appliance, 20 Deception VMs, 128 VLANs, redundant PSU
  • FortiDeceptor 100G — Desktop appliance, local or DaaS managed, 128 VLANs
  • FortiDeceptor Rugged 100G — Industrially hardened desktop, 8 Deception VMs, 48 VLANs, DC power, IP40 rated
  • FortiDeceptor VM — Supports VMware, KVM, Hyper-V, AWS, Azure, GCP
  • FortiDeceptor-as-a-Service (DaaS) — SaaS-hosted, cloud-managed deception with FortiDeceptor 100G Edge appliance

Deception Capabilities

  • Decoys simulate IT, OT, IoT, ICS, medical, SCADA, POS, ATM, ERP, SAP, and more
  • Breadcrumb tokens (fake credentials, files, network shares) placed on real endpoints
  • Fake network traffic generation to appear in attacker reconnaissance scans
  • Bring-your-own decoy (BYOD) golden image support
  • Automatic asset discovery and optimised decoy placement recommendations

Security Features

  • Instant detection of lateral movement, credential theft, ransomware, and MITM attacks
  • Automatic endpoint isolation and quarantine on threat detection
  • Zero-day protection via auto-deployed vulnerable decoys from FortiGuard Labs outbreak alerts
  • On-demand decoy deployment triggered by SOAR playbooks for active threat hunting
  • Integrates with SIEM, SOAR, and the Fortinet Security Fabric

Networking & Deployment

  • Operates in online and air-gapped environments
  • Agentless and non-intrusive — zero impact on production systems
  • Decoys run on unused IP addresses with no impact on network availability
  • Layer 2 tunnel with built-in authentication, encryption, and SSL/TLS for DaaS deployments
  • Supports all levels of the Purdue Model for OT environments

Management

  • Centralised FortiDeceptor console for full lifecycle management
  • Automated deception deployment, evidence analytics, and attack quarantine
  • FortiDeceptor Central Management license for multi-device oversight
  • No highly skilled analysts required — low-friction automation throughout

View data sheet: FortiDeceptor Data Sheet

form

You may also like

Recently viewed