Developers: | Code of Security |
Branches: | Information technologies |
Technology: | Cybersecurity - Information loss preventions, cybersecurity are Means of enciphering |
Honeypot Manager is the pro-active sensor of hacker invasions and unauthorized access to information based on simulation of data and the analysis of addressing of users the imitated application programs and network services.
Honeypot Manager will allow to add protection of an automated system of the organization according to requirements of the legislation and regulating documents regarding confidential information protection using sensors of unauthorized access and invasions based on simulation of data.
Honeypot Manager will allow to reduce significantly risks of disclosure of the personal data and confidential information processed in databases of modern business applications (CRM, ERP, accounting and the personnel) and to timely detect the unauthorized access to them implemented by means of the external hacker attacks or actions of internal violators (insiders).
Certificates of Honeypot Manager
Security Studio Honeypot Manager passed certification tests in FSTEC of Russia on compliance to requirements for the 4th level of absence control of NDV. This certificate allows to apply Honeypot Manager in information systems of personal data processing of any class (up to K1).
Honeypot Manager imitates work of the real system (for example, Oracle DBMS) which is the potential purpose of the attacks or unauthorized access distracts on itself attention and the violator's resources, fixes all his actions and informs a security service on the facts of violations. Thus Honeypot Manager helps to reduce significantly risks of disclosure of personal data and confidential information of the organization.
The important advantage of Honeypot Manager is that it allows to add protection of an automated system of the organization according to requirements of the legislation and regulating documents regarding confidential information protection using sensors of unauthorized access and invasions based on simulation of data.
Key features of Honeypot Manager
- Simulation of a real storage system;
- Detection and registration of the facts NSD to the imitated data;
- The notification of interested persons about attempts of NSD to the imitated data;
- Reports generation about system operation for certain time frames;
- Centralized operation by several simulation systems;
- Possibility of flexible configuration of rules of response to attempts of NSD;
- Possibility of generation of the data close to real.