Defused Alternatives
Defused is described as 'Provides plug-and-play capacities for internal detection of security incidents using decoys' and is an app in the security & privacy category. There are more than 10 alternatives to Defused for Linux, Self-Hosted, SaaS, Web-based and Windows. The best Defused alternative is Thinkst Canary. It's not free, so if you're looking for a free alternative, you could try Aves Netsec or Trapster by Ballpoint. Other great apps like Defused are Labyrinth Deception Platform, Tracebit, Attivo Networks and Cowrie.
- Freemium • Proprietary
Canaries can be deployed in minutes (even on complex networks), giving you all of the benefits of a honeypot without the admin downsides.
License model
- Paid • Proprietary
Platforms
- Software as a Service (SaaS)
Thinkst Canary Features
Labyrinth is a deception-based threat detection technology that identifies and blocks cyber-attacks from within a corporate network.
License model
- Paid • Proprietary
Platforms
- Self-Hosted
Labyrinth Deception Platform Features
Tracebit detects and contains security incidents using cloud canaries. Tracebit generates and maintains tailored canary resources in your cloud environments, closing gaps in stock protection without time and cost intensive detection engineering.
License model
- Paid • Proprietary
Platforms
- Online
Tracebit Features
Aves is a cloud-based cyber deception platform used to deploy and manage deception decoys in your on-premise & cloud environments.
License model
- Freemium • Proprietary
Platforms
- Windows
- Linux
- Online
- Software as a Service (SaaS)
Reduce your reaction time to hackers thanks to Trapster's honeypot which quickly alerts you in case of intrusion on your company's network.
License model
- Freemium • Open Source
Platforms
- Software as a Service (SaaS)
- Self-Hosted
Trapster by Ballpoint Features
Deception technology for early and accurate threat detection of in-network threats. Decoys, endpoint, application, and data deceptions deceive and detect attackers.
License model
- Paid • Proprietary
Platforms
- Self-Hosted
Cowrie is a medium interaction SSH and Telnet honeypot designed to log brute force attacks and the shell interaction performed by the attacker. Cowrie also functions as an SSH and telnet proxy to observe attacker behavior to another system.
License model
- Free • Open Source
Platforms
- Linux
Cowrie Features
Kippo is a medium interaction SSH honeypot designed to log brute force attacks and, most importantly, the entire shell interaction performed by the attacker.
License model
- Free • Open Source
Platforms
- Linux
Kippo Features
Our state-of-the-art security technology is particularly suitable for banking, finance, pharmaceutical and industrial companies. But even SMEs, which often lack IT expertise altogether, find themselves increasingly at the mercy of the growing number of hacker attacks.
License model
- Paid • Proprietary
Country of Origin
Germany
EU
Platforms
- Windows
- Linux
Lupovis provides precise, high-fidelity threat identification with a drastically reduced alert to noise ratio through a SaaS Decepetion as a Service platform.
License model
- Paid • Proprietary
Country of Origin
United States
Platforms
- Software as a Service (SaaS)
- Self-Hosted