

RevBits Deception Technology
The only Deception Technology available which deploy real, desirable, attractive server-based honeypots to trap malicious actors in dual-layered virtualization.
Cost / License
- Pay once or Subscription
- Proprietary
Platforms
- Linux
- Online
- Self-Hosted
- Amazon Elastic Compute Cloud
- Microsoft Azure
- AWS Cloud9




RevBits Deception Technology
Features
Tags
- honey-drops
- deception-solution
- deception-technology
- honeypots
RevBits Deception Technology News & Activities
Recent activities
RevBits Deception Technology information
What is RevBits Deception Technology?
RevBits Deception Technology is the only deception solution on the market with dual-layer virtualization and real honeypot servers. Deploy multiple honeypots with the click of a button and minimal resource consumption. Manual and automated implanted credentials lure attackers to honeypots, revealing the original breached system.
With RevBits Deception Technology, real honeypot database servers (MySQL, PostgreSQL, MSSQL, etc.), file servers (FTP, SMB, etc.), network devices (routers, firewalls, etc.) and common network protocols (SSH, RDP, VNC, etc.) can all be launched with a single click. A central dashboard allows network administrators to manage, configure and monitor all honeypots throughout their enterprise.
RevBits Deception Technology leverages two methods of implanting attractive bait. System administrators have the option to manually implant breadcrumbs in application config files or automatically deploy credentials (honeydrops) across workstations in the network. Both breadcrumbs and honeydrops will lead attackers to honeypots and reveal their source.
