We designed, developed and patented an embedded device, (deception platform), which detects an unauthorized connection/cyber attack or malicious activity utilizing legitimate communications, extracts the communications' payload out of the active process buffers (memory/sockets), converts the payload to a benign hexadecimal (harmless) format, then transmits the cyber data to a defined (customer) device at the time the cyber attack/malicious activity BEGINS.
Cyber Detection Services Inc.
Edit to add your HTML.
Next "Wave" in Technology - Post Cloud Computing - IoT intelligent devices that can reside on "The Edge" of networks, which can also seamlessly integrate into existing cloud and traditional networks.
Why We Are Different...
Approx 80 servers/workstations - Additional Emulations (Servers, Workstations, etc) Can Be Added/Remove At Any Time
Industrial Control Systems (ICS)
Traditional Network Emulation
Virtual Machine Emulation
Network Firewall Emulation
Local Firewalls Emulation
Network Intrusion Detection System Emulation
Affectionately known as our "Critter"
Made in the USA
Hackers are NOT stupid...
The deception (platform) industry niche within cybersecurity it still relatively new and in a stage of infancy.
Hackers are quickly learning about deception (platform) technologies.
Hackers are now becoming acutely aware of the techniques/methods utilized to deceive hackers/malware.
One cannot overlook the first basic step of attempting to conduct a successful cyber attack, which is:
Reconnaissance can easily last longer than a year. The hackers will utilize anonymizers to meticulously study the intended target network.
Hackers, under the protection of anonymizers will "test the waters" and execute a series of "dry runs" against the targeted network.
Using nothing but COMMON SENSE - If the hacker(s) can freely login, move about unabated with no restrictions, then extract data that appears to be authentic, which is actually worthless - the hacker(s) WILL REALIZE THEY WERE WITHIN A DECEPTION PLATFORM.
Hackers can run tests only moments before they execute an actual attack.
WHAT IS THE ANSWER?
The deception (platform) technology MUST APPEAR to be comprised of a sophisticated network data center, along with extremely sophisticated internal defense systems:
1) Network firewall.
2) Firewalls on each server/workstation.
3) Network Intrusion Detection System (IDS), which can instantly detect internal lateral movement.
4) All designed, developed and patented on one device, which is smaller than an average man's hand.
No need to deploy "lures" or "breadcrumbs", or any type of virtual machines/containers.
No training whatsoever and behavior characterists frequently changed.