hero_pattern.png

Honeypot.dk

DEFENICA High Interactive Honeypot Service

 
Defending our critical infrastructure from hackers.
Knowing that someone active is exploiting and hacking your internal Industrial systems right now, can reduce the overall impact, damage and potential loss from the incident.. 
What if  you could have a early warning on such attack...?
Even better, - what if the attacker was wasting precious time to attack a believable decoy, rather that the real infrastructure... while you gets the required time to respond and stop the attack!

Welcome to the world of DEFENICA

DEFENICA =  DEFENd Industrial Control Assets, and that’s what we do.
It's all about securing, what important to our everyday life - critical infrastructure sectors, Industrial control system (ICS) and SCADA (Supervisory Control and Data Acquisition) -  who supports our every-day life.

We do offer a numbers of ICS/SCADA deception solutions & threat feeds; to help the following industries;
  •     Energy (Electric power, Oil & Gas, Wind and Nuclear)
  •     Transportation (Rail, Air)
  •     Healthcare
  •     Water and waste water management
  •     Other types of industrial manufacturing (e.g Food, Beverage, Recycling)

 

 
 

Areas of Practice


WHat's A Honeypot?

A honeypot sensor are a "fake" system, designed to let unsuspecting hackers trying to breach the information security, while recording everything to alert your team that a incident has happen !

Click here for more information

IN-HOUSE HONEY-POT

Do you have the responsibility for critical infrastructure - no deception technology like honeypots to warn you, when something out of the ordinary are happen? - then this in-house honeypot system are something you need ! 

ICS SCADA Threat feeds

A honeypot sensor are a "fake" system, designed to let unsuspecting hackers trying to breach the information security, while recording everything to research the tactics, techniques, and procedures (TTP) a attacker would use to take control over critical infrastructure. 

Click here for more information

ICS/SCADA vulnerabilities signatures

We do also offers ICS/SCADA vulnerabilities signatures - ready to be used in standard Intrusion Detection Systems (IDS) like SNORT.

Please contact us for more information

 

 

 


LEARN HONEYPOTS!

Learn how to plan, build and deploy honeypot systems in our intense practical classes  - available as per-conference, open and private classes.

Click here for more information

CONTACT US

 

 
 
The most important 6 inches on the battlefield is between your ears.
— Gen. James Mattis