Catch hackers in the act and collect evidence
Most companies do not realize when they have already been hacked. The kit intercepts hackers on your corporate network, collects evidence and alerts you. This is how we help IT departments eliminate hackers who have penetrated despite all the security.
Features and attributes
Be alerted when hackers have penetrated your network despite the security solutions in place.
The sensors are passive and do not collect or read data. Because the solution is not 'in-line', the network is not disrupted in any way.
Our virtual appliance is easy to install in your network. After a short configuration, everything is ready. (VMware and Hyper-V ready)
Thanks to our update system, your network is almost always safe from attack, even if these security flaws only just exist.
Available as Software-as-a-Service and deployable to numerous network hubs worldwide (regardless of the number of users).
If your systems are hacked, you will be notified immediately to disable the intruder. Our hackers will help you plug the security breach.
The tracker collects all traces of the hacker's trajectory to present later as evidence of the hacking.
How do we work?
You place our virtual appliance of advanced hackable computers and servers in your network to trap hackers. Once a hacker is detected, you receive an immediate notification of the cyber attack and can collect evidence of the hacking.
This allows you to react immediately and block the attack, disable the hacker(s) and repair the security breach.
The solution has a user-friendly interface, is passive and consumes no bandwidth. It is a very effective detection system that can be attached to an agility contract.
Who is this suitable for?
For small to large companies, we have suitable packages available to get started right away. It is possible to expand at any time. All packages contain virtual appliances, a cloud portal, agile support and updates. There are no hidden costs.