HoneyPoint IP Protection Methodology

Tweet Here’s another use case scenario for HoneyPoint Security Server. This time, we show the methodology we use to scope a HoneyPoint implementation around protecting a specific set of Intellectual Property (IP).  If you would like an in-depth discussion of … Continue reading

HoneyPoint Trojans Overview

Tweet Here’s another quick overview graphic of how HoneyPoint Trojans work. We have been using these techniques since around 2008 and they are very powerful.  We have incorporated them into phishing exercises, piracy studies, incident response, intrusion detection, intelligence gathering, … Continue reading

HoneyPoint in a Point of Sale Network

Tweet We have been getting a LOT of questions lately about how HoneyPoint Security Server (HPSS) fits into a Point of Sale (POS) network. To make it pretty easy and as a high level overview, below is a use case … Continue reading

Using HoneyPoint to Inventory Windows Boxes on a Segment

Tweet For quite some time now, we have been using HoneyPoint Agent and Console to do some passive inventory and mapping exercises for clients, particularly those involved in ICS and SCADA deployments where active scanning to get inventories is often … Continue reading

Ask The Experts: Favorite HoneyPoint Component

Tweet This time around, we got a question from a client where HoneyPoint was being demoed for the experts. Q: “What is your favorite component of HoneyPoint and why? How have you used it to catch the bad guys?” Jim … Continue reading

Using HoneyPoint as a Nuance Detection System in Utility Companies

Tweet I often get asked about how utility companies deploy HoneyPoint in an average implementation. To help folks with that, I whipped up this quick graphic that shows a sample high level deployment.  Thanks for reading! Let me know what … Continue reading

HoneyPoint Used to Confirm Skype URL Indexing

Tweet Last week, several sources were talking about the indexing of URLs that happen inside supposedly secure and private Skype sessions. There was a bit of press about it and we thought it would be fun to test it out … Continue reading

HoneyPoint Security Server ICS/SCADA Deployment Example

Tweet Recently, there have been several questions about potential deployment scenarios for HoneyPoint Security Server in and around ICS and SCADA organizations. Here is a quick, high level view of what a sample deployment might look like in a utility … Continue reading