Deception Techniques and Honeypots | ||||||||||||||
Web App integration | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |||
C&C detection | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | ||||
Emulated traps | N/A | N/A | N/A | N/A | N/A | N/A | ||||||||
NAC integration | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |||||
Full OS traps | N/A | N/A | N/A | |||||||||||
SIEM Integration | N/A | N/A | N/A | N/A | N/A | |||||||||
Endpoint integration | N/A | N/A | N/A | N/A | N/A | N/A | ||||||||
Built-in correlation | N/A | N/A | N/A | N/A | ||||||||||
Built-in ticketing | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |||
Sanbox integration | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | ||||
POS | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |||
ATM | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | ||
SCADA | N/A | N/A | N/A | N/A | N/A | N/A | ||||||||
IoT | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | ||||||
Clouds |
|
|
|
|
| N/A |
| N/A | N/A | N/A |
|
|
|
|
Open API for integration | N/A | N/A | N/A | N/A | N/A | N/A | ||||||||
Botnet detection | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |||||
Automatic code analysis | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |||
Custom trap builder | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |||||
Deception Tokens (fake OS platforms) |
|
|
|
|
|
|
|
| N/A |
|
|
|
| |
Detecting attacks in stages |
|
|
|
|
|
|
|
|
|
|
|
|
| |
Detection of MITM | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |||||
Industry-specific lures | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |||||
EDR | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | ||||||
Orchestration | N/A | N/A | N/A | N/A | N/A | N/A | ||||||||
Active Directory | N/A | N/A | N/A | |||||||||||
Database | N/A | N/A | N/A | N/A | N/A | |||||||||
Shared resource | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |||||||
Using client images | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A | ||||||
REST API | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |||||||
Firewall | N/A | N/A | ||||||||||||
IDS | N/A | N/A | N/A | N/A | ||||||||||
IPS | N/A | N/A | N/A | N/A | N/A | N/A | N/A | |||||||
Built-in Reporting | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A |
Deception Techniques and Honeypots |
Web App integration |
C&C detection |
Emulated traps |
NAC integration |
Full OS traps |
SIEM Integration |
Endpoint integration |
Built-in correlation |
Built-in ticketing |
Sanbox integration |
POS |
ATM |
SCADA |
IoT |
Clouds |
Open API for integration |
Botnet detection |
Automatic code analysis |
Custom trap builder |
Deception Tokens (fake OS platforms) |
Detecting attacks in stages |
Detection of MITM |
Industry-specific lures |
EDR |
Orchestration |
Active Directory |
Database |
Shared resource |
Using client images |
REST API |
Firewall |
IDS |
IPS |
Built-in Reporting |