The advancing capabilities of organized hacker groups and cyber adversaries create an increasing global threat to information systems. The rising threat levels place more demands on security personnel and network administrators to protect information systems. Protecting the network infrastructure is critical to preserve the confidentiality, integrity, and availability of communication and services across an enterprise.
Organizations can no longer rely on perimeter devices to protect the network from cyber intrusions; organizations must also be able to contain the impact/losses within the internal network and infrastructure.
HoneyPoint Security Server™ is a patented platform of distributed honeypot technologies. Whether you are seeking a better way to do intrusion detection, a manageable tool for white listing or a bleeding edge mechanism for actively tampering with attackers during an incident, you have found what you are seeking. HoneyPoint’s distributed sensing, modular nature allows it to be easily configured and deployed across nearly any environment. From traditional IT networks to point of sale, ICS/SCADA to mission critical web applications, HoneyPoint has become the standard for nuance visibility and detection in depth strategies. This comprehensive security software solution pairs up perfectly with both central and remote systems and RTU devices to protect them from attack or unauthorized tampering, while providing an active, real-time monitoring of a network, or multiple networks. The technology has the capacity to capture the attacker’s data so that it may be turned over to the proper authorities for prosecution. A white paper was written about this state of the art technology along with a list of “real life” cyber-attacks around the world in which this software may have prevented. Several nation states, for example, have expressed interest in using this software suite to protect their own power-plants and facilities.
TigerTrax™ is a proprietary platform for gathering and analyzing data from the social media sphere and the overall web. This sophisticated platform, originally developed for threat intelligence purposes, provides the team with a unique capability to rapidly and effectively monitor the world’s data streams for potential points of interest. The uses of the capability include social media code of conduct monitoring, rapid “deep dive” content gathering and analysis, social media investigations & forensics, organizational monitoring/research/profiling and, of course, threat intelligence. The system is modular in nature, which allows the creation of a number of “on demand” and managed services around the platform. Today the platform is in use in some of the following ways: Financial organizations are using the service to monitor social media content for signs of illicit behavior or potential legal/regulatory violations Talent agencies are monitoring their talent pools for content that could impact their public brands Law firms are leveraging the service to identify potential issues with a given case and for investigation/forensics Companies have begun to depend on the service for content monitoring during mergers and acquisitions activities, including quiet period monitoring and pre-offer intelligence If your organization has a need to understand or monitor the social media sphere and deep web content around an issue, a reputation concern or a code of conduct, discuss how TigerTrax can help meet your needs with an account executive today