Deception technology for early and accurate threat detection of in-network threats. Decoys, endpoint, application, and data deceptions deceive and detect attackers.