Blogs

Writing about security topics from Fortis experts

The Key to Proactive Cybersecurity: A Primer on Thinkst Canary Decoy Technology

Thinkst Canary's advanced threat detection solution uses decoys, or "canaries," to lure cyber criminals into a controlled environment, where their actions can be monitored and analyzed. This innovative approach to threat detection provides a new level of visibility into your network, allowing you to quickly identify and respond to potential threats.

The Fortis by Sentinel team can install any number of “canaries” within your environment. These canaries look like any number of high-value targeted systems such as domain controllers or Network Attached Storage (NAS). We can also install canary tokens on your system. These tokens can mimic high-value targeted files, whether it be password lists or HR files. No matter the number or combination of “canaries” and tokens on your system, they will all be closely monitored through Fortis by Sentinel’s ActiveDefense SOC.

The current mean time to detect (MTTD) a threat is 207 days. By combining Thinkst Canary decoy technology with the security expertise and monitoring of Fortis by Sentinel, we can now identify an intruder in your system the moment they touch a “canary” or token. Their ease of use makes Thinkst Canary an ideal solution for organizations of all sizes, from small businesses to large enterprises. It offers a cost-effective solution capable of protecting your network and minimizing the impact of cyberattacks.

A data sheet with additional information on the Thinkst Canary solution can be viewed here. Please reach out to your Fortis by Sentinel Account Manager or fill out this contact form to begin the discussion on how decoy technology can advance the protection of your organization!

jet inside a tunnel