Defused Alternatives

Defused is described as 'Provides plug-and-play capacities for internal detection of security incidents using decoys' and is an app in the security & privacy category. There are more than 10 alternatives to Defused for Linux, Self-Hosted, SaaS, Web-based and Windows. The best Defused alternative is Cowrie, which is both free and Open Source. Other great apps like Defused are PivotGG, Thinkst Canary, Labyrinth Deception Platform and Tracebit.

Copy a direct link to this comment to your clipboard
Defused alternatives page was last updated

Alternatives list

  1. Cowrie icon
     1 like

    Cowrie is a medium interaction SSH and Telnet honeypot designed to log brute force attacks and the shell interaction performed by the attacker. Cowrie also functions as an SSH and telnet proxy to observe attacker behavior to another system.

    10 Cowrie alternatives

    Cost / License

    • Free
    • Open Source

    Platforms

    • Linux
     
  2. PivotGG icon
     Like

    AI-powered pivot workflows and detection queries for incident response - paste an IOC, get guided pivot workflows, AI-generated Splunk/KQL searches, detection opportunities, and exportable investigation reports.

    Cost / License

    • Freemium
    • Proprietary

    Platforms

    • Online
     
  3. Canaries can be deployed in minutes (even on complex networks), giving you all of the benefits of a honeypot without the admin downsides.

    Cost / License

    • Paid
    • Proprietary

    Platforms

    • Software as a Service (SaaS)
     
  4. Labyrinth is a deception-based threat detection technology that identifies and blocks cyber-attacks from within a corporate network.

    Cost / License

    • Paid
    • Proprietary

    Platforms

    • Self-Hosted
     
  5. Tracebit icon
     1 like

    Tracebit detects and contains security incidents using cloud canaries. Tracebit generates and maintains tailored canary resources in your cloud environments, closing gaps in stock protection without time and cost intensive detection engineering.

    Cost / License

    • Paid
    • Proprietary

    Platforms

    • Online
     
  6. Aves Netsec icon
     1 like

    Aves is a cloud-based cyber deception platform used to deploy and manage deception decoys in your on-premise & cloud environments.

    Cost / License

    • Freemium
    • Proprietary

    Platforms

    • Windows
    • Linux
    • Online
    • Software as a Service (SaaS)
     
  7. Reduce your reaction time to hackers thanks to Trapster's honeypot which quickly alerts you in case of intrusion on your company's network.

    Cost / License

    Platforms

    • Self-Hosted
    • Software as a Service (SaaS)
     
  8. Deception technology for early and accurate threat detection of in-network threats. Decoys, endpoint, application, and data deceptions deceive and detect attackers.

    Cost / License

    • Paid
    • Proprietary

    Platforms

    • Self-Hosted
     
  9. Kippo icon
     Like

    Kippo is a medium interaction SSH honeypot designed to log brute force attacks and, most importantly, the entire shell interaction performed by the attacker.

    Cost / License

    • Free
    • Open Source

    Alerts

    • Discontinued

    Platforms

    • Linux
     
  10. CyberTrap icon
     Like

    Our state-of-the-art security technology is particularly suitable for banking, finance, pharmaceutical and industrial companies. But even SMEs, which often lack IT expertise altogether, find themselves increasingly at the mercy of the growing number of hacker attacks.

    Cost / License

    • Paid
    • Proprietary

    Platforms

    • Windows
    • Linux
     
  11. Lupovis provides precise, high-fidelity threat identification with a drastically reduced alert to noise ratio through a SaaS Decepetion as a Service platform.

    Cost / License

    • Paid
    • Proprietary

    Platforms

    • Self-Hosted
    • Software as a Service (SaaS)
     
11 of 11 Defused alternatives