Internal and external protection
Additional protection against internal and external threats for your production systems
Honeypots are simulated production systems that lure and deceive attackers. These imitated systems present easy attack targets to distract attackers from the actual production system. The security of your systems is enhanced and attack strategies are monitored by the honeypot to proactively protect your setup from inside and outside.
The honeypot imitates productive services and replicates for example realistic protocols that communicate with each other. This simulates, for example, an FTP or SMTP service and other potential targets of attack. Furthermore, these are deliberately configured in such a way that a cyber attack is possible. In order to make this possible the honeypot needs to be well disguised otherwise attackers will notice them as a decoy.
A honeypot from noris is operated within your setup in our own german data centers. With the help of a managed elastic SIEM from noris, a honeypot can detect the threatening attack patterns and methods so that appropriate measures can be initiated in time. Together with the SIEM from noris, the collected events are documented and analyzed. Honeypots have an extended logging function for better analysis. They generally log every input and, if necessary, also record the attacker’s payload. This allows threats to be detected and analyzed more quickly, which means that vulnerabilities in the system can be discovered more quickly.
Honeypots provide you with enhanced protection for your production systems. Moreover, it helps you to detect attack patterns and initiate countermeasures before it is too late!
Feel free to contact our sales experts, we will be happy to advise you on the best possible solution for you!