Identity
Who is behind the attack? Is it a bot, is it a fired employee or is it ..? How can I find out more about the hacker?
Gather as much information as you can about an attack on your infrastructure.
Who is behind the attack? Is it a bot, is it a fired employee or is it ..? How can I find out more about the hacker?
What is the purpose of this attack? Why am I being attacked? What devices and information is being targeted?
How can I report this attack with information to the authorities? Where can I find the necessary information?
Our Honeypot will analyze every attack and try to identify the hacker and attack including behaviour and fingerprinting. Everything you need to gather all useful information in a simple and easy to deploy device. Hold up an attack for as long as possible and gather all possible information about an attack and hacker.
By containing and analyzing the attack you can gather information to report to the authorities. This helps you in legal processes and as evidence for your insurance. It's bothersome enough that a hacker made it's way through your Firewall, IDS and other "front-door" security mechanisms. Let's make sure that they don't cause more insurance and legal trouble than needed. We make the hassle that comes with a hack or data-breach easier for you. With our solution you can gather useful information for legal and insurance purposes.
Use our Honeypot as a safetynet when other measures fail