

Thinkst Canary
Canaries can be deployed in minutes (even on complex networks), giving you all of the benefits of a honeypot without the admin downsides.
Cost / License
- Subscription
- Proprietary
Platforms
- Software as a Service (SaaS)
Features
- Honeypot
Tags
- threat-monitoring
- threat-detection
- threat-prevention
Thinkst Canary News & Activities
Recent activities
Thinkst Canary information
What is Thinkst Canary?
Order, configure and deploy your Canaries throughout your network. (These can be hardware, virtual or cloud-based birds!) Make one a Windows file server, another a router, throw in a few Linux webservers while you're at it. Each one hosts realistic services and looks and acts like its namesake. Then you wait. Your Thinkst Canaries run in the background, waiting for intruders. Attackers prowling a target network look for juicy content. They browse Active Directory for file servers and explore file shares looking for documents, try default passwords against network devices and web services, and scan for open services across the network. When they encounter a Thinkst Canary, the services on offer are designed to solicit further investigation, at which point they’ve betrayed themselves, and your Canary notifies you of the incident.




