Deception Techniques and Honeypots | |||||||||
Deception Tokens for WIn | N/A | ||||||||
Deception Tokens for Lin | N/A | N/A | N/A | N/A | N/A | N/A | N/A | ||
Deception Tokens for Mac | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |
Web App integration | N/A | N/A | N/A | N/A | N/A | N/A | N/A | ||
C&C detection | N/A | N/A | N/A | N/A | N/A | N/A | N/A | ||
Emulated traps | N/A | N/A | N/A | N/A | N/A | N/A | N/A | ||
NAC integration | N/A | N/A | N/A | N/A | N/A | N/A | |||
Full OS traps | |||||||||
SIEM Integration | N/A | N/A | |||||||
Endpoint integration | N/A | N/A | N/A | N/A | N/A | N/A | |||
Built-in correlation | N/A | ||||||||
Built-in ticketing | N/A | N/A | N/A | N/A | N/A | N/A | N/A | ||
Sanbox integration | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |
POS | N/A | N/A | N/A | N/A | N/A | N/A | N/A | ||
ATM | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |
SCADA | N/A | N/A | N/A | N/A | N/A | N/A | |||
IoT | N/A | N/A | N/A | N/A | N/A | ||||
Clouds |
|
|
| N/A | N/A |
| N/A | N/A |
|
Open API for integration | N/A | N/A | N/A | N/A | N/A | ||||
Botnet detection | N/A | N/A | N/A | ||||||
Automatic code analysis | N/A | N/A | N/A | N/A | N/A | ||||
Custom trap builder | N/A | N/A | N/A | N/A | N/A |
Deception Techniques and Honeypots |
Deception Tokens for WIn |
Deception Tokens for Lin |
Deception Tokens for Mac |
Web App integration |
C&C detection |
Emulated traps |
NAC integration |
Full OS traps |
SIEM Integration |
Endpoint integration |
Built-in correlation |
Built-in ticketing |
Sanbox integration |
POS |
ATM |
SCADA |
IoT |
Clouds |
Open API for integration |
Botnet detection |
Automatic code analysis |
Custom trap builder |