HoneyPoint Security Server is a powerful tool for organizations seeking to add effective threat management to their security efforts. Like a Swiss Army knife, HoneyPoint has many uses. It can assist with identifying internal malicious activity, help defend your perimeter against scans and probes, and reduce your risk levels by breaking attacker tools used against you. It can help you find and block malware and bots in your environment and even bring realistic threat metrics into your SDLC and other architecture changes before a single line of code is written or a single change is made.
HoneyPoint Security Server is licensed by the number of sensors hosting the HoneyPoint applications. These can be a mixture of HoneyPoints, HornetPoints, Wasps, and/or HoneyPoint Trojans. Licenses are issued in common amounts, with traditional price breaks applied. Starter packs begin at 10 hosts and licensing is available up to “all you can eat” style enterprise site licensing.
Each license includes one console on the platform of your choice. Additional consoles are also available at a nominal fee. A HoneyPoint proxy is available to facilitate crossing network boundaries without exposing the console system.
For more information on licensing, use the form on the right to contact us.
HoneyPoint Supported Platforms
HoneyPoint Security Server supports a wide variety of platforms. The console component requires a GUI, but is supported on Windows, Linux and Macintosh OS X. The console application can be run on a stand-alone server or can share a server with other security product consoles. If desired, the console can also feed data into a SIM or SIEM platform via either syslog/event logs or the plugin interface.
HoneyPoints, HornetPoints and HoneyPoint Trojans do not require a GUI interface. They are configured and managed from the command line. They support Windows, Linux and Macintosh OS X. HoneyPoint Trojans can be created for specific platforms and are custom compiled on demand by MSI.
HPSS can be run in VMWare, including ESX. Virtual machine images for hosting HoneyPoints, HornetPoints and HoneyPoint Trojans are available on a hardened Linux platform.
Alerting, Reporting & Integration Capability
HPSS is capable of powerful alerting. The console component can be used as a full event management platform or can integrate directly into most other incident/event management products. Alerting is accomplished via email/SMS or virtually any other means desired. Syslog/event log integration is built in, and the plugin interface allows HPSS to communicate with virtually any product or device, including custom applications.
HPSS can be used as a part of defense in depth and black hole defenses by acting as additional sensors that can capture and terminate attack activity in the reconnaissance phase. Any host interacting with a HoneyPoint can be added to black lists, firewall or router rules or the like using plugins. This has also proven to increase security against bot attacks and worms.
Stock HTML reporting is provided for a variety of information and metrics. Custom report generation is available.
Obtaining HoneyPoint is easy. Simply contact your account executive and request more information. Our team will work with you to identify the usage scenarios you are interested in, help you scope the number of pseudo-service licenses you need and generate an appropriate proposal.
See what Brent Huston, our CEO and Security Evangelist, has to say about HPSS
Requires Windows 2000 or later.
Requires Linux Kernel 2.2 or later.
Requires Mac OS v.10.2 or later.