InsightIDR Feature

Deception Technology

Get a 免费试用 No credit card necessary
观看演示 See how it all works

You could slow them down, but let’s just stop them cold

XDR that over-indexes on endpoints or a h和ful of event sources create pores in the environment. You can miss activity that signals something nefarious in play. Attackers can slip by. InsightIDR’s easy-to-deploy deception suite lets you create more traps 和 pitfalls: “粘蜜罐”, 亲爱的用户, honey credentials, 和 honey files - all crafted to identify malicious behavior earlier in the attack chain.

Deception Technology
Deception Technology

Deploy 和 manage intruder traps easily

InsightIDR has four types of intruder traps—“粘蜜罐”, 亲爱的用户, honey credentials, 和 honey files—that are quick to set up 和 I’m informed by our continuous attacker research. The intruder traps were built based on Rapid7’s extensive knowledge of attacker behavior.

Catch the use of stolen credentials

InsightIDR not only provides real-time endpoint detection, but also injects fake honey credentials on your endpoints to deceive attackers. If this credential is used anywhere else on the network, such as with pass-the-hash, you’ll be automatically alerted.

Gain file-level visibility

Exfiltration can be difficult to detect. With InsightIDR, you can specify a honey file in a critical directory. All actions taken on this file are monitored, giving you file-level visibility without the effort of deploying a st和alone File Integrity Monitoring solution.

Ready to take InsightIDR for a spin?