Categories
Problems that solves
Shortage of inhouse software developers
Shortage of inhouse IT resources
High costs of IT personnel
Shortage of inhouse IT engineers
Values
Enhance Staff Productivity
Reduce Costs
About Product
Description
Identify Interanal Attackers
ThreatBox looks, acts and feels like a real IoT device or web-service in your environment. When attackers are performing reconnaissance or finding targets, ThreatBox will alert you. When an attacker actually tries to attack a system that is a ThreatBox, it allows it. Holding the attacker while alerting you. You can also deploy our ThreatBox plugins to existing websites in your company to further enhance detection of internal adversaries and lateral movement.
How it Works
Adversaries in your network have one goal - attack and gain access to lucrative systems. These systems can be medical devices, CCTV, transaction/banking systems, PLC/SCADA devices and more. In 2015, we set out with an idea to help detect these kinds of attacks. By creating systems so real, and so distinctly bespoke - attackers will hack them, not realising that the underlying architecture is designed to detect and alert on their covert activities and movement.
Dashboard
Monitor your alerts and get more information on attacks via the dashboard. You also get emailed when a ThreatBox detects malicious activity against it. Got your own security monitoring? ThreatBox can output alerts to many formats including Syslog and support for Splunk!, AlienVault and others.