top of page

PRODUCTS

CyberTAN offers you a wide variety of solutions and products to meet all sorts of threat, vulnerability and compliance management needs. Choosing what's right for you is a big enough challenge and with our help we can guide you to making the right decisions suited for your business. We remain impartial by design and take your business, brand and industry into account before offering recommendations. Our aim is to offer you best of breed solutions that meet simple criteria where possible i.e. Cost Efficiency, Easy to Deploy & Manage, Low Maintenance Overheads.

Download the data sheet
Adobe Acrobat Reader required

HoneyPot - Sing like a bird

Know. When it matters!

 

Order, configure and deploy your HoneyPot throughout your network. Make one a Windows file server, a router, throw in a few Linux webservers while you're at it. Each one hosts realistic services and looks and acts like its namesake.

Then you wait. Your HoneyPot's run in the background, waiting for intruders or staff wondering around your network when they know they shouldn't. Attackers prowling a target network look for juicy content. They browse Active Directory for file servers and explore file shares looking for documents, try default passwords against network devices and web services, and scan for open services across the network.

When they encounter your HoneyPot, the services on offer are designed to solicit further investigation, at which point your pot sings like a Canary and notifies you of the incident.

  • Facebook - White Circle
  • LinkedIn - White Circle
  • Twitter - White Circle

© 2025 CyberTAN Information Security (Pty) Ltd. All Rights Reserved.

Registration No. 2016/304356/07

bottom of page