Who is behind the attack? Is it a bot, is it a fired employee or is it ..? How can I find out more about the hacker?
Contain and Analyze AttacksWhile the initial thought is to block an hacker immediately it can be very useful to contain and analyze the attack for legal purposes.
Your main problems
Gather as much information as you can about an attack on your infrastructure.
Get to know the hacker
Our Honeypot will analyze every attack and try to identify the hacker and attack including behaviour and fingerprinting. Everything you need to gather all useful information in a simple and easy to deploy device. Hold up an attack for as long as possible and gather all possible information about an attack and hacker.
Gather legal information
By containing and analyzing the attack you can gather information to report to the authorities. This helps you in legal processes and as evidence for your insurance. It's bothersome enough that a hacker made it's way through your Firewall, IDS and other "front-door" security mechanisms. Let's make sure that they don't cause more insurance and legal trouble than needed. We make the hassle that comes with a hack or data-breach easier for you. With our solution you can gather useful information for legal and insurance purposes.
Secure your network quick and easily
Use our Honeypot as a safetynet when other measures fail