Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
Insider threats often have the ability to navigate internal systems and are privy to secret security protocols, allowing them to access or transfer critical data without triggering any alerts. Such breaches and instances of data theft can remain unnoticed for extended periods, sometimes lasting years. HoneyTrace provides a solution by enabling you to monitor your sensitive information both within and beyond your network's boundaries, helping you track its movement and assess potential risks of leakage. Operable in the cloud and in environments you cannot fully oversee, HoneyTrace is perfect for ensuring that your partners and employees handle your crucial data appropriately. It boasts user-friendly functionality and seamlessly integrates with your current cybersecurity infrastructure, eliminating the need for extra software installations or management. Moreover, HoneyTrace creates artificial files that are stored in locations accessible solely to authorized personnel; any attempt to access these files triggers a tracer, immediately notifying you of the event. This added layer of security ensures that any unauthorized access is promptly highlighted, further safeguarding your valuable information.
Description
Organizations are increasingly adopting advanced deception-based active defense solutions due to their low-risk nature and their ability to mitigate false positives commonly found in other methods. Acalvio's ShadowPlex has been designed to redefine standards for mitigating advanced persistent threats (APTs), ransomware, and malware by centralizing the entire process. The decoys, which include fake hosts or honeypots, are strategically placed across the enterprise network from a single location, making them appear as legitimate local assets. Additionally, the complexity of a decoy can be adjusted in real-time based on the actions of an attacker, enhancing the effectiveness of the deception. This innovative approach to resource management enables ShadowPlex to provide both extensive scale and a high level of decoy realism, making it a powerful tool for organizations. Furthermore, the system streamlines the configuration and deployment of deception tools through automation. By integrating predefined playbooks with an AI-driven recommendation engine, ShadowPlex can autonomously generate and position the right deception objects where they are needed most. This not only enhances security but also reduces the burden on IT teams, allowing them to focus on more critical tasks.
API Access
Has API
API Access
Has API
Integrations
Active Directory
Cisco Identity Services Engine (ISE)
Cortex XSOAR
IBM QRadar SIEM
Microsoft Entra ID Protection
NetWitness
OpenText Enterprise Security Manager
Securonix Unified Defense SIEM
Splunk Cloud Platform
Integrations
Active Directory
Cisco Identity Services Engine (ISE)
Cortex XSOAR
IBM QRadar SIEM
Microsoft Entra ID Protection
NetWitness
OpenText Enterprise Security Manager
Securonix Unified Defense SIEM
Splunk Cloud Platform
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Penten
Founded
2014
Country
Australia
Website
www.penten.com/applied-ai/honeytrace/
Vendor Details
Company Name
Acalvio Technologies
Country
United States
Website
www.acalvio.com/product/
Product Features
Product Features
Cybersecurity
AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting