The HackTraps give you a distinct advantage over the attackers. You know where the HackTraps are, and they don’t! By strategically placing the HackTraps throughout your network, you ensure that your entire attack surface is covered.
The HackTraps deal with what happens after an intruder has entered the network. Once a hacker has gotten past your defenses, the HackTraps provide an additional line of defense.
Whenever one of the HackTraps is accessed, an alert is immediately generated. Because the HackTraps are not accessed by normal user interaction, the number of alerts this system generates is minimal. This allows you to treat every alert as a real threat and you won’t be bogged down with false positives.
Get notified whenever someone opens the Word document. It works cross-platform and doesn’t require macros. Place it strategically on your network, and be alerted to any intruders. Full Description.
The PDFTrap functions just like the WordTrap. Whenever the PDF is opened, an alert is generated. Place it strategically on your network, and be alerted to any intruders. Full Description.
The XLSTrap functions just like the DOCTrap and PDFTrap. Whenever the spreadsheet is opened, an alert is generated. Place it strategically on your network, and be alerted to any intruders. Full Description.
The GIFTrap is the classic email tracking GIF, but it can be used for more than just email. The GIF image itself is a 1×1 pixel image that can be embedded into the body of an email and is also used by the XLSTrap. Whenever an email or spreadsheet is opened, the image is rendered, and this action triggers the alert. Place it strategically on your network, and be alerted to any intruders. Full Description.
The Directory Trap is a simple WatchPoint that notifies you whenever someone browses a Windows directory using Windows Explorer. Directory Trap also works with network shares, and requires no additional software. Full Description.
Inserting decoy rows into a database gives you a simple way to monitor your database for unauthorized access attempts and other malicious acts. The DBTrap makes this process very simple by providing the code you need to make it all happen. Full Description.
A DNSTrap is simply a DNS entry that gets triggered whenever someone performs a lookup on DNSTrap domain name. Hackers will often browse DNS and with this trap you can trigger an alert without the need to setup DNS logging and monitoring. For more use case examples please read the Full Description.
A URL Watch is a unique URL that is attractive to cybercriminals and would-be wrong doers. Whenever these URLs are resolved, such as by clicking on them, an alert is triggered. The URLs can be embedded within documents, emails, or even on your website. For more use case examples please read the Full Description.
For recommended reading, please visit our Need to Know page.