While they’ve long been a darling of researchers and law enforcement, honeypots are still trying to prove their case for wider enterprise deployment. And it remains a bit of a hard-sell. These “lures” that pose as legitimate network nodes are heavy on attacker- and attack data. But they don’t do anything to actually stop an attack, plus they can attract unwanted attention to your network. But some security experts say elements of honeypot technology can be used as an extra layer in the enterprise security arsenal, especially for protecting against insider threats or other malicious internal activity. “Right now, we’re on the edge of someone picking up this technology and running forward with it for better security for enterprise installations,” says Ralph Logan, principal with The Logan Group and vice president of the Honeynet Project.