Thinkst Canary was integrated by Mindflow to enable users to automate their incident management and better protect their information system.
Thinkst Canary Overview
Thinkst Canary is a deception technology that provides high-fidelity detection points that can be spread throughout the network.
Canaries come in packs of five or more hardware, virtual, or cloud-based deployments. There’s no limit on Canarytokens.
Canaries can be physical devices but they aren’t just hardware devices. Virtualized Canaries can be run inside virtual infrastructure with the same features as physical Canarys.
Canarytokens are like Web bugs are transparent images that track when someone opens an email. They work by embedding a unique URL in a page’s image tag and monitoring incoming GET requests. As a Canary customer, free Canarytokens are available and generated alerts appear in the console like any other.
Canarytokens do this for file reads, database queries, process executions or patterns in log files, and more, allowing traps to be implanted in production systems rather than setting up separate honeypots.
Canarytokens are a simple way to tripwire things. The infrastructure needed is provided so tokens can be deployed in seconds and provide immediate benefit.
Benefits
Constantly report in and provide an up-to-the-minute report on their status.
Alert via email, text message, slack notification, webhook, or old-fashioned Syslog.
Deployed in three minutes to reduce overhead and provide nearly zero false positives.
Free traps through Canarytokens to disseminate across your network.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.