A honeypot “baits” would-be attackers by leading them down a path towards useless or false information. A honeypot is a computer system that is set up to act as a decoy to lure cyber attackers and to detect, deflect, or study attempts to gain unauthorized access to information systems. CCG tricks the trickers by setting traps within the system.

Using a honeypot allows CCG to quickly identify inappropriate user activity.

CCG’s Phen will quickly and accurately be able to classify attack attempts being made to your infrastructure.

stop and block
Phen analyzes this to provide a detailed understanding of the attack and allow Phen to take countermeasures to stop and block the threat.

Read CCG’s white paper on the need for Honeypots in addition to an Intrusion Detection System (IDS).