Smokescreen Description

Smokescreen, a deception technology and active defense company, provides a solution that covers your network with decoys that trap hackers. You'll learn how adversaries work and how decoys are placed all over your network to provide high-fidelity detections at every stage. It's simple to use and understand. We have you covered on the Perimeter and Cloud, internal network, endpoints and Active Directory. Launch your first deception campaign using ready-made decoys. Instead of wasting time configuring a new solution, focus on detecting threats and not on wasting man-hours. An interaction with an IllusionBLACK device is a sign of a breach. You know it's real when you receive an alert. Automated forensics and root cause analysis in just two clicks You can accomplish more with half the team in half the time. Integrations out-of-the box with SIEMs and Firewalls, EDRs. Proxy, threat feeds, SOAR and more.

Pricing

Pricing Starts At:
$7,750 per year

Integrations

Reviews

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Company Details

Company:
Smokescreen
Year Founded:
2015
Headquarters:
United States
Website:
www.smokescreen.io

Media

Recommended Products
Extended Threat Intelligence | SOCRadar Icon
Extended Threat Intelligence | SOCRadar

See what hackers already know about your organization – and stop them from getting in.

Enterprises need full-spectrum cyber intelligence—beyond social media and the dark web. SOCRadar monitors cloud buckets, dark web leaks, and external threats in real time. Automate takedowns, detect brand impersonations, and stay ahead of evolving attacks. Strengthen your security with Extended Threat Intelligence.
Free Trial

Product Details

Platforms
SaaS
Type of Training
Documentation
Live Online
Webinars
In Person
Customer Support
Phone Support
24/7 Live Support
Online

Smokescreen Features and Options

Cybersecurity Software

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Network Security Software

Access Control
Analytics / Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Smokescreen User Reviews

Write a Review
  • Previous
  • Next