Products
CYBERTRAP Product versions and pricing
CYBERTRAP Product versions and pricing
With CYBERTRAP deception technology you are one step ahead of potentital attackers by laying out traps that are tailor-made for your company. Here is an overview of our deception products:
for Managed Service Provider CYBERTRAP Express | for SMEs CYBERTRAP Pro | For Large Organisations CYBERTRAP Enterprise | |
---|---|---|---|
Installation | easy | automated | individual |
Endpoints | up to 100 per endcustomer | up to 900 | unlimited |
Decoys | pre-defined | up to 3 | unlimited |
Threat-Intelligence Data | medium | high | very high |
Endpoint Deception | ✔ | ✔ | ✔ |
Active Directory Deception | ✔ | ✔ | |
Web Application Deception | ✔ | ||
Request a quote | Request a quote | Request a quote |
CYBERALARM for Windows is finally there!
To help small and medium-sized enterprises (SMEs) better protect their corporate data, we have developed the world’s first IT security alarm system. A cyber alarm system for intrusion detection.
Deception technology at the push of a button
CYBER TRAP Express is an immediately available Deception as a Service model via the cloud. It is aimed at managed service providers who maintain many customers and want to offer Deception technology as an additional service. CYBERTRAP Express is quick and easy to install for the customer and offers support and protection for modern home and flex office environments. It addresses the protection needs of small and medium-sized companies and acts as a cybersecurity alarm system, which is installed and monitored centrally.
MSPs
Lack of Resources
Fast Intrusion
Detection
Deception Technology für SMEs
CYBERTRAP PRO is aimed at small and medium sized companies that do not have the capacity to run a complete deception solution but still need quick intrusion detection. With a simple setup, customers can enjoy an additional level of security without the need for constant manual alarm analysis. Just like a silent alarm, CYBERTRAP PRO silently monitors and und immediately reports if any abnormal activity is detected.
SMEs
Lack of Resources
Fast Intrusion
Detection
Tailor-made deception for large organizations
CYBERTRAP ENTERPRISE is aimed at large companies and government agencies that are regularly exposed to targeted hacker attacks. It is not at all uncommon for it to take an average of 180 days to detect real attackers and other people with malicious or suspicious intentions.
Here at CYBERTRAP we’ve come up with a better alternative with our Enterprise version and offer you a customised endpoint and web deception solution:
With the integration into a SIEM, we do not deliver IOCs (incidents of compromise), which are always based on known incidents, but proof of compromise. This real-time, customised threat intelligence information in the MITRE/ATT@CK context helps the SOC team focus on the critical alerts and analyse critical events more effectively.
With our customised, European deception technology we control the attacks, meaning we are always one step ahead of the attackers.
Trackdown
Application
Deception
Endpoint
Deception
Attack Context
for CYBERTRAP Enterprise
Our deception technology can be used cloud-based, on-premises or hybrid.
Choosing this option, everything will be hosted in the cloud and attached via a site-2-site VPN (IPSec) to the customers infrastructure. To achieve deception in the customer’s infrastructure, the CYBERTRAP Lures are rolled out on-premise. The lures will lead a malicious actor to the CYBERTRAP Decoy, which is hosted in the Cloud.
The hybrid approach still hosts the CYBERTRAP Backend in the Cloud, but places the CYBERTRAP Decoys on-premise. All monitored data on the Decoys will be sent encrypted to the Backend. This has the large benefit that no VPN needs to be configured between the customer’s network and the CYBERTRAP environment.
This is the classic “everything on the customer’s side” approach. Both the CYBERTRAP Decoys and the CYBERTRAP Backend will be installed on-premise. Those components will be installed on customer’s systems, the hardware requirements of the installation manual will apply. For installation, customization and maintenance reasons, a remote management interface (preferrably SSH) is required.
“Never interrupt an enemy when he is making a mistake.”
– Napoleon Bonaparte