For VendorsBlog
Login

Compare: Deception Techniques and Honeypots

Characteristics

Deception Tokens (fake OS platforms)

  • Windows
  • Windows
  • Linux
  • Mac
  • Windows
  • Windows
  • Windows
  • Windows
  • Windows
  • Windows
  • N/A
  • Windows
  • Windows
  • Linux
  • Mac
  • iOS
  • Windows
  • Linux

Web App integration

C&C detection

Detecting attacks in stages

  • Active reconnaissance
  • Lateral movement
  • Exfiltration
  • Active reconnaissance
  • Lateral movement
  • Exfiltration
  • Active reconnaissance
  • Lateral movement
  • Active reconnaissance
  • Lateral movement
  • Exfiltration
  • Active reconnaissance
  • Lateral movement
  • Exfiltration
  • Active reconnaissance
  • Lateral movement
  • Exfiltration
  • Active reconnaissance
  • Lateral movement
  • Exfiltration
  • Active reconnaissance
  • Lateral movement
  • Active reconnaissance
  • Lateral movement
  • Active reconnaissance
  • Lateral movement
  • Active reconnaissance
  • Lateral movement
  • Exfiltration
  • Active reconnaissance
  • Lateral movement
  • Exfiltration

Detection of MITM

Emulated traps

Industry-specific lures

NAC integration

Full OS traps

SIEM Integration

Endpoint integration

EDR

Orchestration

Active Directory

Built-in correlation

Built-in ticketing

Sanbox integration

Database

Shared resource

POS

ATM

SCADA

IoT

Clouds

  • AWS
  • Azure
  • OpenStack
  • AWS
  • Azure
  • OpenStack
  • SaaS available
  • GCP
  • AWS
  • Azure
  • OpenStack
  • SaaS available
  • Yes
  • N/A
  • AWS
  • Azure
  • OpenStack
  • SaaS available
  • N/A
  • N/A
  • N/A
  • Yes
  • AWS
  • GCP
  • AWS
  • Azure
  • OpenStack

Using client images

Open API for integration

Botnet detection

Automatic code analysis

Custom trap builder

REST API

Found mistake? Write us.