Nightingale Honeypots are a "cause and effect" methodology. They do not try to analyze the attack, evaluate the motivation, or employ forensics. Their sole responsibility is to alert you that someone is doing something that they should not be doing on your network.
Most attackers will begin to scan and traverse the network to catalog vulnerable assets and escalate their attack upon the initial compromise of your system. This tactic is part of the "attackers' methodology," which is what a Nightingale Honeypot detects.
Once turned on the Nightingale Honeypot will 'call home' and update automatically. Then you can deal with other essential duties in your day or further customize the Nightingale Honeypot. Customizing includes adding whitelists, custom profiles, or sending alerts to specific e-mail addresses or employ SMS alerts.
Using our exclusive "Nightingale Over the Air Services Framework" or Nightingale-OASF, the honeypot can be managed anywhere and automatically keeps itself up-to-date.
*Dynamic Networks require no initial configuration. Static networks require you to answer four questions.
Nightingale Honeypots go to work immediately upon deployment. Here are just a few of the many cases where Nightingale Honeypots are defending their owner's networks every day.
Take advantage of our 30-day trial program. We also offer special pricing for quantity purchases. Discounts for Government and Critical Infrastructure sector members are available.
Still have questions?
Contact us and we’ll reach out to you right away! Or feel free to call us at 844.736.7286 ext 100.