Deception Technology by CyberTrap
CyberTrap expands any existing network consisting of endpoints - servers, desktops and laptops - and a firewall by creating decoy systems. These can be virtual or physical systems, equipped with Windows or Linux, enhanced by a monitoring component. The CyberTrap Frontend enables you to configure the decoys and set up the Deception Services. With just a few clicks, a Database Management system is installed, configured and started - as well as Filesharing, Remote Access, Web-Logins and more. Also the Lures can be created there and will be copied fully automatically to the dedicated endpoints, using the software distribution system of the customer.
And remember: CyberTrap is agentless - no software is installed on the endpoints. The lures are pointing to the decoys and their deception services.
Our state-of-the-art deception technology is particularly suitable for banking, finance, pharmaceutical and industrial companies. But even SMEs, which often lack IT expertise altogether, find themselves increasingly at the mercy of the growing number of hacker attacks. Unfortunately, so-called herd immunity does not work against targeted or random attacks.
ShadowPlex by Acalvio - One platform for powering deceptions. With Shadowplex® deception, detect malicious activity with precision and speed.
Lupovis.io - Lupovis provides precise, high-fidelity threat identification with a drastically reduced alert to noise ratio through a SaaS Deception as a Service platform.
Attivo Networks - Efficiently derail attacker discovery, lateral movement, privilege escalation, & collection activities early in the attack cycle with Attivo.
Akamai - Akamai is the leading content delivery network (CDN) services provider for media and software delivery, and cloud security solutions.
Thinkst Canary - Most companies discover they’ve been breached way too late.
Interset - Interset has designed an advanced user behavioral analytics solution to deliver accuracy and speed in threat detection.