RevBits Deception Technology icon
RevBits Deception Technology icon

RevBits Deception Technology

The only Deception Technology available which deploy real, desirable, attractive server-based honeypots to trap malicious actors in dual-layered virtualization.

Continuous monitoring

Cost / License

  • Pay once or Subscription
  • Proprietary

Platforms

  • Linux
  • Online
  • Self-Hosted
  • Amazon Elastic Compute Cloud
  • Microsoft Azure
  • AWS Cloud9
Deceive attackers with real honeypots
Multi-channel alert system
+1
Easy implementation
-
No reviews
0likes
0comments
0alternatives
0news articles

Features

Suggest and vote on features
No features, maybe you want to suggest one?

 Tags

  • honey-drops
  • deception-solution
  • deception-technology
  • honeypots

RevBits Deception Technology News & Activities

Highlights All activities

Recent activities

No activities found.

RevBits Deception Technology information

  • Developed by

    US flagRevBits
  • Licensing

    Proprietary and Commercial product.
  • Pricing

    One time purchase that costs $0, and / or subscription that costs $0 per month.
  • Alternatives

    0 alternatives listed
  • Supported Languages

    • English
RevBits Deception Technology was added to AlternativeTo by Neal Hesterberg on and this page was last updated .
No comments or reviews, maybe you want to be first?
Post comment/review

What is RevBits Deception Technology?

RevBits Deception Technology is the only deception solution on the market with dual-layer virtualization and real honeypot servers. Deploy multiple honeypots with the click of a button and minimal resource consumption. Manual and automated implanted credentials lure attackers to honeypots, revealing the original breached system.

With RevBits Deception Technology, real honeypot database servers (MySQL, PostgreSQL, MSSQL, etc.), file servers (FTP, SMB, etc.), network devices (routers, firewalls, etc.) and common network protocols (SSH, RDP, VNC, etc.) can all be launched with a single click. A central dashboard allows network administrators to manage, configure and monitor all honeypots throughout their enterprise.

RevBits Deception Technology leverages two methods of implanting attractive bait. System administrators have the option to manually implant breadcrumbs in application config files or automatically deploy credentials (honeydrops) across workstations in the network. Both breadcrumbs and honeydrops will lead attackers to honeypots and reveal their source.