Deception Techniques and Honeypots
Web App integration
N/AN/AN/AAvaliableN/AN/AN/AAvaliableN/AN/AN/AN/AN/AAvaliable
C&C detection
N/AAvaliableN/AN/AN/AAvaliableN/AN/AN/AN/AN/AN/AAvaliable
Emulated traps
AvaliableAvaliableN/AN/AN/AAvaliableN/AAvaliableAvaliableAvaliableN/AN/AAvaliable
NAC integration
AvaliableAvaliableN/AN/AN/AN/AN/AN/AAvaliableN/AN/AN/AAvaliable
Full OS traps
AvaliableAvaliableAvaliableAvaliableAvaliableN/AAvaliableAvaliableAvaliableN/AN/AAvaliableAvaliableAvaliable
SIEM Integration
AvaliableAvaliableN/AN/AN/AAvaliableAvaliableAvaliableAvaliableN/AN/AAvaliableAvaliableAvaliable
Endpoint integration
AvaliableAvaliableN/AN/AN/AAvaliableN/AAvaliableAvaliableN/AN/AAvaliableAvaliable
Built-in correlation
AvaliableAvaliableAvaliableN/AAvaliableAvaliableAvaliableN/AAvaliableN/AN/AAvaliableAvaliableAvaliable
Built-in ticketing
N/AAvaliableN/AN/AN/AN/AN/AN/AN/AN/AN/AN/AAvaliable
Sanbox integration
AvaliableAvaliableN/AN/AN/AN/AN/AN/AN/AN/AN/AN/AAvaliable
POS
N/AAvaliableN/AN/AN/AN/AN/AN/AN/AN/AN/AN/AAvaliable
ATM
N/AN/AN/AN/AN/AN/AN/AN/AN/AN/AN/AN/AAvaliable
SCADA
AvaliableAvaliableN/AN/AN/AAvaliableN/AAvaliableAvaliableN/AN/AAvaliableAvaliable
IoT
AvaliableAvaliableN/AN/AAvaliableN/AN/AN/AAvaliableN/AN/AN/AAvaliable
Clouds
  • AWS
  • Azure
  • OpenStack
  • AWS
  • Azure
  • OpenStack
  • SaaS available
  • GCP
  • AWS
  • Azure
  • OpenStack
  • SaaS available
  • Yes
N/A
  • AWS
  • Azure
  • OpenStack
  • SaaS available
N/AN/AN/A
  • Yes
  • AWS
  • GCP
  • AWS
  • Azure
  • OpenStack
  • Yes
Open API for integration
AvaliableAvaliableAvaliableN/AN/AN/AN/AAvaliableN/AN/AAvaliableAvaliableAvaliable
Botnet detection
N/AAvaliableN/AN/AN/AAvaliableN/AN/AN/AN/AN/AAvaliable
Automatic code analysis
N/AN/AN/AN/AN/AN/AN/AN/AN/AN/AN/AAvaliable
Custom trap builder
N/AAvaliableN/AN/AN/AN/AN/AN/AN/AN/AAvaliableAvaliable
Deception Tokens (fake OS platforms)
  • Windows
  • Windows
  • Linux
  • Mac
  • Windows
  • Windows
  • Windows
  • Windows
    • Windows
    N/A
    • Windows
    • Windows
    • Linux
    • Mac
    • iOS
    • Windows
    • Linux
    • Windows
    • Linux
    Detecting attacks in stages
    • Active reconnaissance
    • Lateral movement
    • Exfiltration
    • Active reconnaissance
    • Lateral movement
    • Exfiltration
    • Active reconnaissance
    • Lateral movement
    • Active reconnaissance
    • Lateral movement
    • Exfiltration
    • Active reconnaissance
    • Lateral movement
    • Exfiltration
    • Active reconnaissance
    • Lateral movement
    • Exfiltration
      • Active reconnaissance
      • Lateral movement
      • Exfiltration
      • Active reconnaissance
      • Lateral movement
      • Active reconnaissance
      • Lateral movement
      • Active reconnaissance
      • Lateral movement
      • Active reconnaissance
      • Lateral movement
      • Exfiltration
      • Active reconnaissance
      • Lateral movement
      • Exfiltration
      • Lateral movement
      • Exfiltration
      Detection of MITM
      N/AAvaliableN/AN/AAvaliableN/AN/AN/AN/AN/AN/AAvaliable
      Industry-specific lures
      N/AAvaliableN/AN/AN/AN/AN/AAvaliableN/AN/AN/AAvaliable
      EDR
      AvaliableAvaliableN/AN/AN/AN/AN/AAvaliableN/AN/AN/AAvaliable
      Orchestration
      AvaliableAvaliableAvaliableN/AN/AN/AN/AAvaliableN/AN/AAvaliableAvaliableAvaliable
      Active Directory
      AvaliableAvaliableAvaliableN/AN/AAvaliableAvaliableAvaliableN/AAvaliableAvaliableAvaliableAvaliable
      Database
      AvaliableAvaliableN/AAvaliableAvaliableN/AAvaliableN/AN/AN/AAvaliableAvaliableAvaliable
      Shared resource
      AvaliableAvaliableN/AN/AN/AN/AAvaliableN/AN/AN/AAvaliableAvaliableAvaliable
      Using client images
      AvaliableAvaliableN/AN/AN/AN/AN/AAvaliableN/AN/AN/AAvaliableAvaliable
      REST API
      AvaliableAvaliableAvaliableN/AN/AN/AN/AN/AN/AN/AAvaliableAvaliableAvaliable
      Deception Techniques and Honeypots
      Web App integration
      C&C detection
      Emulated traps
      NAC integration
      Full OS traps
      SIEM Integration
      Endpoint integration
      Built-in correlation
      Built-in ticketing
      Sanbox integration
      POS
      ATM
      SCADA
      IoT
      Clouds
      Open API for integration
      Botnet detection
      Automatic code analysis
      Custom trap builder
      Deception Tokens (fake OS platforms)
      Detecting attacks in stages
      Detection of MITM
      Industry-specific lures
      EDR
      Orchestration
      Active Directory
      Database
      Shared resource
      Using client images
      REST API