Request Pricing
What customers are saying
All Plans Include…
Network Deception
Server system decoys that host services like SSH servers, databases, file shares and more.
Endpoint Deception
A minefield for your endpoints. Includes decoy files, decoy credentials, decoy processes etc.
Active Directory Deception
Fake users in active directory that detect enumeration activity and malicious access.
Cloud Deception
Decoys web servers, databases, file servers, etc. that detect lateral movement in your cloud environments.
Email Deception
Email decoys that intercept attackers attempting to mount social engineering/ spear-phishing attacks.
Golden Image Support
Realistic high-interaction OS enviornments for deeper attack visibility.
MirageMaker
Out-of-the-box decoy datasets for a variety of use cases to launch deception campaigns rapidly.
Landmine
Simple deployment for decoy files, processes, and breadcrumbs on your endpoints.
ThreatParse
Automated forensics and root-cause analysis in two clicks. Extracts insights from logs.
Cloud-First Architecture
No hardware, zero maintenance hassles, always updated. Doesn’t take a village to implement.
On-prem Options
Ability to deploy on-prem or to your private cloud if that’s how your IT is set up.
Enterprise Features
2FA, RBAC, log retention, automatic backups, SSO. API access, audit logs, SNMP monitoring, and more.
Orchestration
Integrations with SIEMS, firewalls, EDRs, NACs, and SOARs for automating inciudent response.
Forensics
Identify the process that the attacker has used to engage with the decoy. Dig deeper with PCAPs.
Support and Training
Access to a help desk, documentation, on-boarding sessions, and product training.