For VendorsBlog
Login
Compare: Deception Techniques and Honeypots
Characteristics
Deception Tokens (fake OS platforms)
  • Windows
  • Linux
  • Windows
  • Windows
  • Linux
  • Mac
  • Windows
  • Windows
  • Windows
  • Windows
  • Windows
  • Windows
  • N/A
  • Windows
  • Windows
  • Linux
  • Mac
  • iOS
Web App integration
C&C detection
Detecting attacks in stages
  • Active reconnaissance
  • Lateral movement
  • Exfiltration
  • Active reconnaissance
  • Lateral movement
  • Exfiltration
  • Active reconnaissance
  • Lateral movement
  • Exfiltration
  • Active reconnaissance
  • Lateral movement
  • Active reconnaissance
  • Lateral movement
  • Exfiltration
  • Active reconnaissance
  • Lateral movement
  • Exfiltration
  • Active reconnaissance
  • Lateral movement
  • Exfiltration
  • Active reconnaissance
  • Lateral movement
  • Exfiltration
  • Active reconnaissance
  • Lateral movement
  • Active reconnaissance
  • Lateral movement
  • Active reconnaissance
  • Lateral movement
  • Active reconnaissance
  • Lateral movement
  • Exfiltration
Detection of MITM
Emulated traps
Industry-specific lures
NAC integration
Full OS traps
SIEM Integration
Endpoint integration
EDR
Orchestration
Active Directory
Built-in correlation
Built-in ticketing
Sanbox integration
Database
Shared resource
POS
ATM
SCADA
IoT
Clouds
  • AWS
  • Azure
  • OpenStack
  • AWS
  • Azure
  • OpenStack
  • AWS
  • Azure
  • OpenStack
  • SaaS available
  • GCP
  • AWS
  • Azure
  • OpenStack
  • SaaS available
  • Yes
  • N/A
  • AWS
  • Azure
  • OpenStack
  • SaaS available
  • N/A
  • N/A
  • N/A
  • Yes
  • AWS
  • GCP
Using client images
Open API for integration
Botnet detection
Automatic code analysis
Custom trap builder
REST API