The CISO required better visibility into their large and diverse international network that spanned corporate and remote offices. Like many large enterprises, even with a mature and well-implemented security posture, they faced the challenge of fully understanding what threats were within their environment and how likely they were to cause harm. After researching numerous detection security controls, they recognized deception technology as a solution to a range of challenges. Additionally, they saw value in the platform’s ability to gather adversary intelligence including TTPs, IOCs, and threat intelligence that provided insight into the attacker’s entry point, methods, and motivation.