Skip to main content
TrustRadius
CyberTrap

CyberTrap

Overview

What is CyberTrap?

CyberTrap, headquartered in Vienna, offers their eponymous security software solution, a deception-as-a-service, that provides protection for enterprises against targeted attacks and cyber crime.

Read more
Recent Reviews
Read all reviews
Return to navigation

Pricing

View all pricing

CYBERTRAP Express

15€

Cloud
per year per endpoint (up to 100 endpoints)

CYBERTRAP Pro

30€

Cloud
per year per endpoint (up to 900)

CYBERTRAP Enterprise

Custom Quote

Cloud
unlimited

Entry-level set up fee?

  • Setup fee required
For the latest information on pricing, visithttps://cybertrap.com/en/products

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Starting price (does not include set up fee)

  • $16.55 per year Per endpoint (up to 100 endpoints)
Return to navigation

Product Details

What is CyberTrap?

In the case of deception technologies, attackers are deliberately diverted into a specially created IT environment even before they can penetrate further into the company’s actual infrastructure. Within this fictitious environment, it is possible to systematically observe the attackers in order to identify their motivation, methods and, in some cases, even their identity and clients. This is the goal of the CyberTrack deception-as-a-service solution.

Why Deception instead of Honeypots?

The vendor describes IT security as an ongoing responsibility that should not be viewed as a one-time investment. The field is in constant evolution. Hackers are continuously finding new ways to break into systems or exploit new security vulnerabilities. Just as a car is maintained with regular service, occasionally buying new tires or replacing worn parts, an IT network also requires ongoing maintenance.

Honeypots were created to draw hackers into an area they otherwise would not have been interested in. The vendor states very few such people fall for that anymore. The goal nowadays is not to attract hackers with these “honeypots”, but to remain as inconspicuous as possible. According to CyberTrack, only deception can achieve that.

How Deception protects data

The extent (or lack thereof) to which popular hardware and software in IT security are actually used to defend against attackers is well illustrated in the so-called “Pyramid of an Attackers Pain” (David J Bianco, Mandiant/Fireeye). It shows that the challenge for hackers increases from the bottom, lower layers, such as anti-malware and firewall systems, to the top.

CyberTrap's approach is supported through offering three different packages, each of which the user can self-manage after a short training session, or book with an optional managed service:


CYBERTRAP Endpoint Deception is rolled out on the network, hidden lures (decoys) are deployed. These lures are designed and customized specifically for your network so that an attacker cannot differentiate them from the actual network elements.

By using these lures, the intruder is thus undetectably redirected to a deceptively real image of the productive network, the deception environment. There, he can “let off steam” without causing any harm or finding any genuine company data.

At the same time, the system monitors and evaluates the behavior of the attacker, generating valuable threat intelligence data that can be accessed via a dashboard or via risk management reports. This data can be imported into any SOC/SIEM systems, anti-virus software, and firewalls to holistically strengthen security measures in the production network.

To prevent a hacker attack with CyberTrack Web Application Deception, an older version of the application is specially prepared and placed online. To potential attackers, everything looks real, so that they stumble upon strategically placed lures in the application’ source code. These lures (invisible to normal users) are directly linked to monitored traps called decoys. As soon as a hacker follows one of the lures, he is tracked at every turn.

In the Web Application Deception environment, the uninvited guest can therefore “let off steam” without causing any harm or finding any genuine company data. At the same time, the system monitors and evaluates the behavior of the attacker, generating valuable threat intelligence data that can be accessed via a dashboard or via risk management reports. This data can be imported into any SOC/SIEM systems, anti-virus software, and firewalls to holistically strengthen security measures in the production network.

And when CYBERTRAP Active Directory Deception is active, it detects any scan for privileged user accounts and uses this opportunity to send the hacker false credentials. As soon as the attacker uses these to navigate further in the network, he falls into the trap.

The intruder is undetectably redirected to a deceptively real Active Directory image, the Deception environment. There, he can “let off steam” without causing any harm or finding any genuine company data. At the same time, by precisely monitoring the attack and analyzing the attack tactics, the company’s own Active Directory is strengthened against future attacks.

CyberTrap Technical Details

Deployment TypesSoftware as a Service (SaaS), Cloud, or Web-Based
Operating SystemsUnspecified
Mobile ApplicationNo
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(2)

Reviews

(1-2 of 2)
Companies can't remove reviews or game the system. Here's why
Score 7 out of 10
Vetted Review
Verified User
Incentivized
We use Cyber Trap as an additional service that deflects the constant attempts to infiltrate and compromise our business activities; it alerts us of any attacks so that we are aware of the nature of the episode giving us valuable information and time to counter and threat to the business before it can affect its intended target.
  • Data security is effective.
  • Good easy issue detection
  • Good prevention capability
  • Better Training
  • Simpler setup
It tracks hackers without making them aware and can be tailor-made to suit your needs regarding privacy and security. Initial setup and training of users can be complex and require quite a bit of time and effort to attain the format you require.
  • CyberTrap is very good at identifying potential threats to multiple applications and services and reporting these issues
  • Good virtualization tools
  • Good information gathering and reporting
CyberTrap gives you a free demo so that you can evaluate the product and I was impressed also the pricing is transparent and very reasonable it also has a wide range of modules to suit the size of your company from Express, Pro and Enterprise should you wish to upgrade as your business grows.
Gianna Montana | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
The security that CyberTrap provides to the project data and to all the organization information is effective and its threats detection functionalities and the notification tools are incredible. CyberTrap has easy capabilities and an extra intelligent capability that helps create multiple solutions for easy multiple data transfer protection across multiple websites, and the channels offered for all data handling by CyberTrap are very secure and effective alert options.
  • Data security is effective.
  • Easy issue detection.
  • Cyber threats prevention capability.
  • A CyberTrap user must be trained effectively.
  • To protect a large number of data through CyberTrap may not be easy to new users.
  • Using the most advanced CyberTrap features is not an easy task to any user.
The maximum protection against multiple cyber data threats and also against various cyber crimes, CyberTrap provides effective and actionable capabilities which helps identify and also block unwanted online trackers effectively and very easily. Analytics through CyberTrap functions are excellent and are provided in real-time data and also its reporting functions are active and very much reliable.
  • Easy to identify multiple attacks through the entire browsing and effective management of potential data.
  • Gathering potential threats through multiple applications on Cloud services and issue reporting, CyberTrap is excellent.
  • Very smooth websites manipulation system, excellent virtualization tools, and easy to extract data through CyberTrap capabilities.
Return to navigation