+
+

Related Products

  • Cynet All-in-One Cybersecurity Platform
    383 Ratings
    Visit Website
  • Adaptive Security
    37 Ratings
    Visit Website
  • MedTrainer
    238 Ratings
    Visit Website
  • NMIS
    14 Ratings
    Visit Website
  • Borealis
    11 Ratings
    Visit Website
  • Criminal IP
    12 Ratings
    Visit Website
  • Auvik
    662 Ratings
    Visit Website
  • MetaLocator
    17 Ratings
    Visit Website
  • Monitask
    267 Ratings
    Visit Website
  • Kasm Workspaces
    126 Ratings
    Visit Website

About

Creating the highly realistic fake networks required to effectively delay, divert or deceive an adversary is time-consuming, expensive, and resource-intensive. Penten’s Deception.ai is a powerhouse artificial intelligence solution that reduces the cost of designing and deploying the highly realistic fake networks required to detect, monitor, and engage sophisticated cyber adversaries. The system’s intelligent workflow provides advice on the design of your fake network and attack path, the scenario planning and deployment, and the creation of tailored, realistic users and content. The fake users interact with your environment performing system and user tasks, behaving in a human-like manner with a realistic pattern of life, performing actions such as reading and sending emails, editing documents, calling, and chatting to other users. This quickly delivers the highly realistic environment required to engage an adversary.

About

With the cloud architecture and intuitive interface in InsightIDR, it's easy to centralize and analyze your data across logs, network, endpoints, and more to find results in hours—not months. User and Attacker Behavior Analytics, along with insights from our threat intel network, is automatically applied against all of your data, helping you detect and respond to attacks early. In 2017, 80% of hacking-related breaches used either stolen passwords and/or weak or guessable passwords. Users are both your greatest asset and your greatest risk. InsightIDR uses machine learning to baseline your users' behavior, automatically alerting you on the use of stolen credentials or anomalous lateral movement.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Enterprises interested in a solution to manage their detection, engagement, and response tasks

Audience

IT teams

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Penten
Founded: 2014
Australia
www.penten.com/applied-ai/deception-ai/

Company Information

Rapid7
Founded: 2000
United States
www.rapid7.com

Alternatives

Fidelis Elevate

Fidelis Elevate

Fidelis Security

Alternatives

Alert Logic

Alert Logic

Fortra
ShadowPlex

ShadowPlex

Acalvio Technologies
Arctic Wolf

Arctic Wolf

Arctic Wolf Networks
FortiDeceptor

FortiDeceptor

Fortinet

Categories

Categories

Endpoint Detection and Response (EDR) Features

Behavioral Analytics
Blacklisting/Whitelisting
Continuous Monitoring
Malware/Anomaly Detection
Prioritization
Remediation Management
Root Cause Analysis

SIEM Features

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Integrations

AWS AppFabric
Armis
AuthPoint
CnSight
CyberArk Workforce Identity
Cylera Platform
Cynerio
Imperva CDN
Imperva DDoS Protection
Imperva WAF
Intellicta
Monad
NXLog
NorthStar Navigator
Optiv Managed XDR
Recorded Future
Sacumen Connector as a Service (CaaS)
The Respond Analyst

Integrations

AWS AppFabric
Armis
AuthPoint
CnSight
CyberArk Workforce Identity
Cylera Platform
Cynerio
Imperva CDN
Imperva DDoS Protection
Imperva WAF
Intellicta
Monad
NXLog
NorthStar Navigator
Optiv Managed XDR
Recorded Future
Sacumen Connector as a Service (CaaS)
The Respond Analyst
Claim Deception.ai and update features and information
Claim Deception.ai and update features and information
Claim Rapid7 InsightIDR and update features and information
Claim Rapid7 InsightIDR and update features and information