Intrusion detection in the cloud isn’t where it needs to be. External and internal adversaries alike can dodge complex or difficult to interpret rules and anomaly models. Tracebit flips this problem on its head. Instead, the decoys we deploy are the anomalies. These are hard to avoid - producing actionable alerts that not only enhance detection but also impede threats.Something looks off?