1. Active Defense
  2. Detection of insider threats
  3. Replica of Actual System in Single or Double containers
  4. More Information on Attacker with more Engagement Time
  5. Analytics trends
  6. Real Time Attacker Information