What type of Applications Zscaler Deception Impersonate

Any web application front end can be impersonated in Zscaler Deception. We have 100+ application front-ends that ship out of the box that the customer can simply select from a drop down and deploy.

We can also use custom self-contained Docker containers to provide a more interactive experience for the adversary.

Customers often will deploy web front-ends on the Perimeter Decoys to collect threat Intel. Internal decoys have more services and capabilities typically not exposed to the internet - although the platform will allow customers to deploy high-interaction decoys on the Internet as well.