Skip to main content
TrustRadius
CyberTrap

CyberTrap

Overview

What is CyberTrap?

CyberTrap, headquartered in Vienna, offers their eponymous security software solution, a deception-as-a-service, that provides protection for enterprises against targeted attacks and cyber crime.

Read more
Recent Reviews
Read all reviews
Return to navigation

Pricing

View all pricing

CYBERTRAP Express

15€

Cloud
per year per endpoint (up to 100 endpoints)

CYBERTRAP Pro

30€

Cloud
per year per endpoint (up to 900)

CYBERTRAP Enterprise

Custom Quote

Cloud
unlimited

Entry-level set up fee?

  • Setup fee required
For the latest information on pricing, visithttps://cybertrap.com/en/products

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Starting price (does not include set up fee)

  • $16.55 per year Per endpoint (up to 100 endpoints)
Return to navigation

Product Details

What is CyberTrap?

In the case of deception technologies, attackers are deliberately diverted into a specially created IT environment even before they can penetrate further into the company’s actual infrastructure. Within this fictitious environment, it is possible to systematically observe the attackers in order to identify their motivation, methods and, in some cases, even their identity and clients. This is the goal of the CyberTrack deception-as-a-service solution.

Why Deception instead of Honeypots?

The vendor describes IT security as an ongoing responsibility that should not be viewed as a one-time investment. The field is in constant evolution. Hackers are continuously finding new ways to break into systems or exploit new security vulnerabilities. Just as a car is maintained with regular service, occasionally buying new tires or replacing worn parts, an IT network also requires ongoing maintenance.

Honeypots were created to draw hackers into an area they otherwise would not have been interested in. The vendor states very few such people fall for that anymore. The goal nowadays is not to attract hackers with these “honeypots”, but to remain as inconspicuous as possible. According to CyberTrack, only deception can achieve that.

How Deception protects data

The extent (or lack thereof) to which popular hardware and software in IT security are actually used to defend against attackers is well illustrated in the so-called “Pyramid of an Attackers Pain” (David J Bianco, Mandiant/Fireeye). It shows that the challenge for hackers increases from the bottom, lower layers, such as anti-malware and firewall systems, to the top.

CyberTrap's approach is supported through offering three different packages, each of which the user can self-manage after a short training session, or book with an optional managed service:


CYBERTRAP Endpoint Deception is rolled out on the network, hidden lures (decoys) are deployed. These lures are designed and customized specifically for your network so that an attacker cannot differentiate them from the actual network elements.

By using these lures, the intruder is thus undetectably redirected to a deceptively real image of the productive network, the deception environment. There, he can “let off steam” without causing any harm or finding any genuine company data.

At the same time, the system monitors and evaluates the behavior of the attacker, generating valuable threat intelligence data that can be accessed via a dashboard or via risk management reports. This data can be imported into any SOC/SIEM systems, anti-virus software, and firewalls to holistically strengthen security measures in the production network.

To prevent a hacker attack with CyberTrack Web Application Deception, an older version of the application is specially prepared and placed online. To potential attackers, everything looks real, so that they stumble upon strategically placed lures in the application’ source code. These lures (invisible to normal users) are directly linked to monitored traps called decoys. As soon as a hacker follows one of the lures, he is tracked at every turn.

In the Web Application Deception environment, the uninvited guest can therefore “let off steam” without causing any harm or finding any genuine company data. At the same time, the system monitors and evaluates the behavior of the attacker, generating valuable threat intelligence data that can be accessed via a dashboard or via risk management reports. This data can be imported into any SOC/SIEM systems, anti-virus software, and firewalls to holistically strengthen security measures in the production network.

And when CYBERTRAP Active Directory Deception is active, it detects any scan for privileged user accounts and uses this opportunity to send the hacker false credentials. As soon as the attacker uses these to navigate further in the network, he falls into the trap.

The intruder is undetectably redirected to a deceptively real Active Directory image, the Deception environment. There, he can “let off steam” without causing any harm or finding any genuine company data. At the same time, by precisely monitoring the attack and analyzing the attack tactics, the company’s own Active Directory is strengthened against future attacks.

CyberTrap Technical Details

Deployment TypesSoftware as a Service (SaaS), Cloud, or Web-Based
Operating SystemsUnspecified
Mobile ApplicationNo
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(2)

Reviews

(1-1 of 1)
Companies can't remove reviews or game the system. Here's why
Score 7 out of 10
Vetted Review
Verified User
Incentivized
We use Cyber Trap as an additional service that deflects the constant attempts to infiltrate and compromise our business activities; it alerts us of any attacks so that we are aware of the nature of the episode giving us valuable information and time to counter and threat to the business before it can affect its intended target.
  • Data security is effective.
  • Good easy issue detection
  • Good prevention capability
  • Better Training
  • Simpler setup
It tracks hackers without making them aware and can be tailor-made to suit your needs regarding privacy and security. Initial setup and training of users can be complex and require quite a bit of time and effort to attain the format you require.
  • CyberTrap is very good at identifying potential threats to multiple applications and services and reporting these issues
  • Good virtualization tools
  • Good information gathering and reporting
CyberTrap gives you a free demo so that you can evaluate the product and I was impressed also the pricing is transparent and very reasonable it also has a wide range of modules to suit the size of your company from Express, Pro and Enterprise should you wish to upgrade as your business grows.
Return to navigation