+
+

Related Products

  • Criminal IP ASM
    18 Ratings
    Visit Website
  • Wiz
    1,439 Ratings
    Visit Website
  • Reflectiz
    18 Ratings
    Visit Website
  • SOCRadar Extended Threat Intelligence
    101 Ratings
    Visit Website
  • Astra Pentest
    238 Ratings
    Visit Website
  • Orca Security
    522 Ratings
    Visit Website
  • IPVanish
    111 Ratings
    Visit Website
  • Aikido Security
    224 Ratings
    Visit Website
  • Chainguard
    49 Ratings
    Visit Website
  • ZeroPath
    2 Ratings
    Visit Website

About

We scan the entire public internet, create real-time threat intelligence streams, and reports that show the exposure of what is connected to the Internet. What is your Internet Attack Surface? Organizations currently own a large number of internet exposed assets, some of them they are not even aware exist. Everyday, more and more companies expose their servers and services to the internet, increasing the attack surface that can be targeted by hackers. Today's rapidly expanding universe of sensors, cloud, remote access, and IoT devices has created high levels of complexity that are impossible to secure without constant monitoring, both from within and outside the organizations networks. We have built a distributed platform of scanners and honeypots, to acquire, classify and correlate different types of data. We use all of these datapoints to match those digital assets to an organization, allowing us to provide a global, up-to-date, view of organizations known and unknown assets.

About

RevBits Deception Technology elevates the threat-hunting capability for security administrators by offering sophisticated architecture in the deception/honeypot marketplace. By deploying real server-based honeypots in a resource-light environment - distinguishing between real and fake servers is virtually impossible. Adding the ability to plant fake honey drop credentials throughout the network, breach points are illuminated and isolated. RevBits Deception Technology is designed to attract, capture, and hold the malicious act or malicious software that gains entry into the network and probes looking for valuable assets. RevBit's deployment of real server-based decoys makes detection between real and malicious software straightforward. Using RevBits integrated solutions allows for the exchange of intelligence between modules, based on standardized logging, to improve detection, response time, and protection of network assets including honeypots.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Organizations that require a distributed platform of scanners and honeypots, to acquire, classify and correlate different types of data

Audience

Enterprises seeking a solution to protect and secure their network assets

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

$10 per month
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

BinaryEdge
Founded: 2015
Switzerland
www.binaryedge.io

Company Information

RevBits
Founded: 2016
United States
revbits.com/products/revbits-deception-technology

Alternatives

Alternatives

Baits

Baits

MokN
ShadowPlex

ShadowPlex

Acalvio Technologies
Trapster

Trapster

Ballpoint
ShadowKat

ShadowKat

3wSecurity

Categories

Categories

Integrations

Polarity

Integrations

Polarity
Claim BinaryEdge and update features and information
Claim BinaryEdge and update features and information
Claim RevBits Deception Technology and update features and information
Claim RevBits Deception Technology and update features and information