insightIDR

Deception Technology

Get Started

You could slow them down, but let’s just stop them cold

XDR that over-indexes on endpoints or a handful of event sources create pores in the environment. You can miss activity that signals something nefarious in play. Attackers can slip by. InsightIDR’s easy-to-deploy deception suite lets you create more traps and pitfalls: honeypots, honey users, honey credentials, and honey files - all crafted to identify malicious behavior earlier in the attack chain.

Deception Technology
Deception Technology

Deploy and manage intruder traps easily

InsightIDR has four types of intruder traps—honeypots, honey users, honey credentials, and honey files—that are quick to set up and I’m informed by our continuous attacker research. The intruder traps were built based on Rapid7’s extensive knowledge of attacker behavior.

Catch the use of stolen credentials

InsightIDR not only provides real-time endpoint detection, but also injects fake honey credentials on your endpoints to deceive attackers. If this credential is used anywhere else on the network, such as with pass-the-hash, you’ll be automatically alerted.

Gain file-level visibility

Exfiltration can be difficult to detect. With InsightIDR, you can specify a honey file in a critical directory. All actions taken on this file are monitored, giving you file-level visibility without the effort of deploying a standalone File Integrity Monitoring solution.

Ready to take InsightIDR for a spin?

Free 30-Day Trial