Bitcrack Cyber Security ThreatBox
0.00

Problems that solves

Shortage of inhouse software developers

Shortage of inhouse IT resources

High costs of IT personnel

Shortage of inhouse IT engineers

Values

Enhance Staff Productivity

Reduce Costs

Bitcrack Cyber Security ThreatBox

Deception-based Attack Monitoring

Description

Identify Interanal Attackers ThreatBox looks, acts and feels like a real IoT device or web-service in your environment. When attackers are performing reconnaissance or finding targets, ThreatBox will alert you. When an attacker actually tries to attack a system that is a ThreatBox, it allows it. Holding the attacker while alerting you. You can also deploy our ThreatBox plugins to existing websites in your company to further enhance detection of internal adversaries and lateral movement. How it Works Adversaries in your network have one goal - attack and gain access to lucrative systems. These systems can be medical devices, CCTV, transaction/banking systems, PLC/SCADA devices and more. ​ In 2015, we set out with an idea to help detect these kinds of attacks. By creating systems so real, and so distinctly bespoke - attackers will hack them, not realising that the underlying architecture is designed to detect and alert on their covert activities and movement. Dashboard Monitor your alerts and get more information on attacks via the dashboard. You also get emailed when a ThreatBox detects malicious activity against it. Got your own security monitoring? ThreatBox can output alerts to many formats including Syslog and support for Splunk!, AlienVault and others.