For VendorsBlog
Login
Please turn the screen for optimal content display

Deception Tokens (fake OS platforms)

Web App integration

C&C detection

Detecting attacks in stages

Detection of MITM

Emulated traps

Industry-specific lures

NAC integration

Full OS traps

SIEM Integration

Endpoint integration

EDR

Orchestration

Active Directory

Built-in correlation

Built-in ticketing

Sanbox integration

Database

Shared resource

POS

ATM

SCADA

IoT

Clouds

Using client images

Open API for integration

Botnet detection

Automatic code analysis

Custom trap builder

REST API

  • Windows
  • Linux
  • Windows
  • Windows
  • Linux
  • Mac
  • Windows
  • Windows
  • Windows
  • Windows
  • Windows
  • Windows
  • N/A
  • Windows
  • Windows
  • Linux
  • Mac
  • iOS
  • Active reconnaissance
  • Lateral movement
  • Exfiltration
  • Active reconnaissance
  • Lateral movement
  • Exfiltration
  • Active reconnaissance
  • Lateral movement
  • Exfiltration
  • Active reconnaissance
  • Lateral movement
  • Active reconnaissance
  • Lateral movement
  • Exfiltration
  • Active reconnaissance
  • Lateral movement
  • Exfiltration
  • Active reconnaissance
  • Lateral movement
  • Exfiltration
  • Active reconnaissance
  • Lateral movement
  • Exfiltration
  • Active reconnaissance
  • Lateral movement
  • Active reconnaissance
  • Lateral movement
  • Active reconnaissance
  • Lateral movement
  • Active reconnaissance
  • Lateral movement
  • Exfiltration
  • AWS
  • Azure
  • OpenStack
  • AWS
  • Azure
  • OpenStack
  • AWS
  • Azure
  • OpenStack
  • SaaS available
  • GCP
  • AWS
  • Azure
  • OpenStack
  • SaaS available
  • Yes
  • N/A
  • AWS
  • Azure
  • OpenStack
  • SaaS available
  • N/A
  • N/A
  • N/A
  • Yes
  • AWS
  • GCP
Found mistake? Write us.