Listing Thumbnail

    OpenCanary Honeypot on Ubuntu (Monthly Subscription) by AdvanceCo

     Info
    Deployed on AWS
    AWS Free Tier
    Deploy a hardened deception honeypot in minutes. OpenCanary by AdvanceCo provides early warning alerts for unauthorized network lateral movement and breach detection within your AWS VPC using low-interaction digital decoys.

    Overview

    Enterprise Deception Technology: Detect Intruders with Digital Decoys

    Perimeter security is not enough. AdvanceCo Inc provides a production-hardened deployment of OpenCanary, a powerful open-source deception tool designed to catch hackers who have already bypassed your firewall.

    OpenCanary acts as a silent sentry within your network. By mimicking common services like file servers, databases, or web portals, it creates a digital landmine. Because legitimate users have no reason to access these decoys, any interaction is a high-probability indicator of a security breach or malicious lateral movement.

    Key Features:

    Versatile Service Emulation: Configure your canary to look like a Linux server, a Windows workstation, or a network device to fit your environment.

    Low Interaction Design: Provides maximum security with minimal risk, as the services are emulated rather than fully functional.

    Streamlined Alerting: Logs are formatted for easy ingestion into AWS CloudWatch, S3, or third-party SIEM platforms.

    Cloud-Native Optimization: Specifically tuned for the AWS Nitro System and optimized for Ubuntu 22.04 LTS for maximum uptime.

    The AdvanceCo Advantage: Our Raleigh-based engineering team removes the complexity of managing honeypots. By choosing our supported AMI, you receive:

    Automated Maintenance: We handle the critical security updates and software patches.

    Deployment Stability: Pre-configured defaults designed for enterprise VPC environments.

    Professional Assistance: Access to technical support for configuration and alerting logic.

    Ideal Use Cases:

    Internal Threat Detection: Identify rogue employees or compromised accounts moving through your internal network.

    Ransomware Early Warning: Catch automated scanners as they look for vulnerable network shares.

    Post-Breach Analysis: Gain valuable intelligence on attacker techniques and intended targets.

    Highlights

    • Multi-Service Deception: Mimic high-value targets including SSH, FTP, Telnet, HTTP, and SQL services to lure and identify attackers. Instant Breach Detection: Receive real-time notifications the moment an unauthorized user interacts with a decoy service.
    • Lightweight and Hardened: Optimized for minimal resource consumption, allowing for cost-effective deployment across multiple subnets.
    • Compliance Support: Meets essential monitoring and logging requirements for SOC 2, PCI DSS 4.0, and HIPAA. AdvanceCo Managed Support: Includes regular security patching for the Ubuntu kernel and OpenCanary binaries from our US-based team.

    Details

    Delivery method

    Delivery option
    64-bit (x86) Amazon Machine Image (AMI)

    Latest version

    Operating system
    Ubuntu 22.04

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    OpenCanary Honeypot on Ubuntu (Monthly Subscription) by AdvanceCo

     Info
    Pricing is based on a fixed subscription cost. You pay the same amount each billing period for unlimited usage of the product. Pricing is prorated, so you're only charged for the number of days you've been subscribed. Subscriptions have no end date and may be canceled any time.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    Fixed subscription cost

     Info
    Monthly subscription
    $100.00/month

    Vendor refund policy

    No Refunds. Software supplied as is.

    Custom pricing options

    Request a private offer to receive a custom quote.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    64-bit (x86) Amazon Machine Image (AMI)

    Amazon Machine Image (AMI)

    An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.

    Version release notes

    Updated Release

    Additional details

    Usage instructions

    SSH in as ubuntu.

    Resources

    Support

    Vendor support

    Professional Support: Includes OS and software maintenance from the AdvanceCo US-based engineering team.Paid telephone, slack, and software maintenance support is available to customers requiring supported open source products. Find us at https://www.advancecoinc.com/aws-marketplace.html  Contact us at secproductsupport@advancecoinc.com 

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly

    Accolades

     Info
    Top
    10
    In Monitoring, Log Analysis
    Top
    50
    In Security Observability, Device Security

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    0 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    Insufficient data
    2 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    Insufficient data
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Honeypot Technology
    Network honeypot that simulates vulnerable services to detect and alert on unauthorized access attempts
    Daemon-Based Service Monitoring
    Daemon process that runs canary versions of services to monitor for misuse and abuse
    Threat Detection and Alerting
    Automated detection of potential threats with email notifications including threat source IP address and breach location
    Multi-Service Canary Deployment
    Capability to deploy multiple canary service versions simultaneously for comprehensive threat detection across different service types
    Network Traffic Analysis
    Signature-based detection via Suricata with full packet capture (PCAP) capability and protocol metadata extraction using Zeek or Suricata
    Host Visibility and Monitoring
    Elastic Agent for data collection with live queries via osquery and centralized management through Elastic Fleet
    File Analysis and Extraction
    File analysis and extraction capabilities via Strelka with support for rich protocol metadata and file extraction from network traffic
    Intrusion Detection and Deception
    Intrusion detection honeypots based on OpenCanary for enterprise visibility and threat detection
    Centralized Security Operations Console
    Native Security Onion Console (SOC) interface for alerting, detection, hunting, dashboards, case management, and PCAP traffic analysis with support for standalone, single VM, or distributed grid deployment modes
    Threat Detection Accuracy
    99% threat detection accuracy across endpoints, network, cloud, identities and SaaS applications
    Continuous Threat Hunting
    Continuous threat hunting capabilities with proactive identification and analysis of potential threats
    Threat Intelligence Integration
    Intel-driven analytics powered by global threat intelligence team with actionable threat profiles and adversary insights
    Automated Response and Remediation
    Guided, automated, and human-led response capabilities with specific remediation recommendations
    24/7 Expert Investigation
    Round-the-clock expert investigation and response services for potential threats across all security domains

    Security credentials

     Info
    Validated by AWS Marketplace
    FedRAMP
    GDPR
    HIPAA
    ISO/IEC 27001
    PCI DSS
    SOC 2 Type 2
    No security profile
    No security profile
    -
    -
    -
    -
    -

    Contract

     Info
    Standard contract
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    0 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    0%
    0%
    0%
    0 reviews
    No customer reviews yet
    Be the first to review this product . We've partnered with PeerSpot to gather customer feedback. You can share your experience by writing or recording a review, or scheduling a call with a PeerSpot analyst.