Detect internal infection spread and block malicious external connections.
Hackers who gain network access will be caught by NetTrap when they report to the C2 server or probe the internal network. NetTrap can detect and trap threats within the network, suppress the spread of malicious programs and activity within the network, and at the same time intercept malicious external connection attempts.
NetTrap Core Capabilities
Mimic Devices & Trap Threats
Simulate a range of network services and devices like general hosts, server hosts, databases, NAS, IoT & IIoT devices, printers, IP surveillance cameras, etc. to lure hackers in and expose their whereabouts.
Up-to-the-Minute Alerting
From regular reports to emergency alerts, network administrators can get emails with up-to-the-minute statistics, including the total numbers of blocklisted IPs from NetProbe, received packets, and malicious IPs triggered. Furthermore, alerts can be exported using syslog interface for comprehensive investigation and analysis.
DNS Protection
Automatically protect insiders and internal systems from connecting to malicious websites and stop them from becoming relay hosts or getting ransomware with a block list of over one million. DoH/DoT encrypted domain queries can be used to avoid the DNS resolution requests from eavesdropping.
Automatic Threat Updates
The malicious domain name list is auto-updated regularly which greatly reduces the need to maintain a complex connection list on-site.
Effective Data Collection
Collects malicious login data, malicious programs, and records attacking packet info to understand which vulnerabilities are targeted to gain insight into attack techniques.
NetTrap Adds Value Like No Other
Localized Protection
Automatically create tailor-made network security with AI-based behavior analysis of targeted attack activities while reducing the large and recurring costs of increasing staff.
AI-based Prevention
Intervene early when unknown threats are identified and easily process incidents with automated and always-on AI-based threat pattern learning.
Asset Safety
Protect intellectual property, customer loyalty, brand reputation and revenue by reducing the risk of internal confidentiality and customer information being leaked.
Fast Response
Shorten response times when attacks occur, uncover the root cause of security problems, and restore business operations without interruption.