Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Identifies and halts ransomware threats originating from the network, while supporting honeypots and heuristic detection methods. It prevents compromised machines from accessing files on other safeguarded servers within the network. The system has the capability to monitor users copying files and can optionally restrict access. Real-time notifications enable designated personnel to conduct immediate investigations. The Ultra features are necessary for full functionality. It tracks activities relating to file deletions, movements, or readings, making it commonly utilized for compliance-related requirements. The Ultra version enhances this by logging data into a database for detailed reporting. It also permits only trusted applications to operate, offering defense against various types of malware, a practice known as Application Whitelisting. This comprehensive approach helps organizations maintain a secure and compliant digital environment.

Description

RevBits Deception Technology enhances the threat-hunting capabilities of security administrators by providing an advanced architecture within the deception and honeypot sector. The use of genuine server-based honeypots in environments with limited resources makes it nearly impossible to differentiate between actual and fake servers. By strategically placing counterfeit honey drop credentials across the network, potential breach points can be clearly identified and contained. This technology is specifically engineered to lure, capture, and retain any malicious actions or software that infiltrate the network while searching for valuable resources. The implementation of real server-based decoys simplifies the process of distinguishing between legitimate and harmful software. Additionally, RevBits’ integrated solutions facilitate the sharing of intelligence among different modules through standardized logging, which enhances detection capabilities, reduces response times, and strengthens the protection of network assets, including honeypots. Overall, this innovative approach significantly fortifies the security posture of organizations against evolving threats.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

No details available.

Integrations

No details available.

Pricing Details

$199 one-time payment
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Power Admin

Founded

2003

Country

United States

Website

www.poweradmin.com

Vendor Details

Company Name

RevBits

Founded

2016

Country

United States

Website

revbits.com/products/revbits-deception-technology

Product Features

Audit

Alerts / Notifications
Audit Planning
Compliance Management
Dashboard
Exceptions Management
Forms Management
Issue Management
Mobile Access
Multi-Year Planning
Risk Assessment
Workflow Management

Product Features

Alternatives

Max Secure Spyware Detector Reviews

Max Secure Spyware Detector

Max Secure Software

Alternatives

ShadowPlex Reviews

ShadowPlex

Acalvio Technologies
Dr.Web Reviews

Dr.Web

Doctor Web
Baits Reviews

Baits

MokN
eScan Reviews

eScan

MicroWorld Technologies
Trapster Reviews

Trapster

Ballpoint