Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs
  • DRAW

ThreatWise Architecture: Deception-Based Threat Detection Explained

Commvault
05/19/2026
0
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • ThreatWise uses deception technology to detect attackers early by deploying decoy systems and lures that attract threat actors away from production assets while generating high-fidelity alerts.
  • The TSOC management console provides centralized monitoring, sensor management, and real-time threat analysis, serving as the operational hub for the entire deception infrastructure.
  • Appliances can be deployed on physical or virtual infrastructure, with each supporting up to 500 threat sensors ranging from simple device emulations to fully interactive operating systems.

This architectural overview introduces Commvault Cloud ThreatWise, a deception-based threat detection and response solution designed to identify attackers early in the kill chain without exposing production assets. The video walks through the complete ThreatWise architecture, starting with the TSOC (Threat Security Operations Center), which serves as the centralized management console for monitoring alerts, managing sensors, and analyzing threats in real time. Appliances form the operational backbone, hosting emulation sensors and optional network intelligence sensors across both physical and virtual infrastructure, with each appliance capable of supporting up to 500 threat sensors for broad network coverage. The deception strategy employs lures—digital breadcrumbs designed to attract attackers—that guide threat actors toward decoy systems rather than legitimate production assets. Sensors range from simple emulations like security cameras and printers to fully interactive Windows or Linux systems that enable deep behavioral analysis of attacker techniques. When attackers engage with these deceptive elements, events are logged and alerts are forwarded to both the TSOC and SIEM platforms via syslog for rapid response. The video concludes with a practical deployment scenario showing how SQL server sensors create a protective network of decoys around a critical database server, demonstrating how the layered deception approach significantly reduces the probability of successful attacks on real assets.

Chapters

0:00 - Introduction to ThreatWise
0:16 - TSOC Management Console
0:31 - Appliances and Sensors
1:04 - Lures and Deception Strategy
1:57 - SQL Server Protection Example

Key Quotes

0:31 "This is where the magic happens. Appliances host the emulation sensors and, optionally, the network intelligence sensor."
1:04 "Lures are the breadcrumbs that lead attackers to the traps and sensors distributed across your network. Lures are designed to be irresistible to attackers, guiding them directly into your deception environment."
2:36 "This is how we safeguard our assets. Proactive, strategic, and effective."

Categories:
  • » Webinar Library » Commvault
  • » Cybersecurity » Network Security
  • » Data Protection
Channels:
News:
Events:
Tags:
  • deception technology
  • threat detection
  • security operations
  • network security
  • cyber defense
  • SIEM integration
  • threat intelligence
  • attack surface management
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: ThreatWise Architecture: Deception-Based Threat Detection Explained

              Upcoming Webinar Calendar

              • 05/20/2026
                10:00 PM
                05/20/2026
                Establishing a Robust AI Governance Framework for GenAI Throughout Deployment Stages
                https://www.truthinit.com/index.php/channel/1953/establishing-a-robust-ai-governance-framework-for-genai-throughout-deployment-stages/
              • 05/21/2026
                11:00 AM
                05/21/2026
                Risk in Real Time Demo Series: The Autonomous Era - Orchestrating a Resilient Enterprise
                https://www.truthinit.com/index.php/channel/1372/risk-in-real-time-demo-series-the-autonomous-era-orchestrating-a-resilient-enterprise/
              • 05/27/2026
                10:00 AM
                05/27/2026
                Adopting AI: From Illusion to Intentional Control
                https://www.truthinit.com/index.php/channel/1924/harnessing-ai-transitioning-from-illusion-to-purposeful-mastery/
              • 05/28/2026
                01:00 PM
                05/28/2026
                Harnessing AI for Smaller Teams: Strategies for Secure Implementation
                https://www.truthinit.com/index.php/channel/1951/harnessing-ai-for-smaller-teams-strategies-for-secure-implementation/
              • 06/02/2026
                01:00 PM
                06/02/2026
                Spring of Satori: Delving into Recent Findings and 2026's Threat Landscape
                https://www.truthinit.com/index.php/channel/1930/spring-of-satori-delving-into-recent-findings-and-2026s-threat-landscape/
              • 06/16/2026
                07:00 AM
                06/16/2026
                Transforming Data Risk into Actionable Priorities: Which Issues to Address First?
                https://www.truthinit.com/index.php/channel/1952/transforming-data-risk-into-actionable-priorities-which-issues-to-address-first/

              Upcoming Events

              • May
                20

                Establishing a Robust AI Governance Framework for GenAI Throughout Deployment Stages

                05/20/202610:00 PM ET
                • May
                  21

                  Risk in Real Time Demo Series: The Autonomous Era - Orchestrating a Resilient Enterprise

                  05/21/202611:00 AM ET
                  • May
                    27

                    Adopting AI: From Illusion to Intentional Control

                    05/27/202610:00 AM ET
                    • May
                      28

                      Harnessing AI for Smaller Teams: Strategies for Secure Implementation

                      05/28/202601:00 PM ET
                      • Jun
                        02

                        Spring of Satori: Delving into Recent Findings and 2026's Threat Landscape

                        06/02/202601:00 PM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version