NARC®

OUR NARC® INTERNAL DECEPTION NETWORK TECHNOLOGY

Identifies internal compromise or malicious insiders through the use of deception. By creating virtual targets and enticing malicious users to them through open services and potentially valuable data, organizations can root out illegitimate traffic and users quickly and with low error rates.

The patented NARC® Internal Deception Network Technology is comprised of computer security devices that are easily customizable for specific organizational needs using standard and proven software technologies. Devices can be configured to clone network assets providing a realistic range of targets. This allows for customizable solutions unique to each network. When a connection is made to a device, it is a deliberate action making the rate of false positives very low. The NARC® solution has been shown to root out insider and advanced persistent threats within diverse environments. Patent No.: US 10,594,716 & Patent No.: US 11,240,260

The NARC® Internal Deception Technology has a range of features that set it apart from other honey-pot type devices on the market today for a fraction of the cost.

HARDWARE & SOFTWARE-BASED
SOLUTION

All devices are deployed as a small hardware device with a software-based solution within the client’s internal environment. Endpoints are hosted within the internal network and are un-intrusive passive hosts.

CUSTOMIZABLE TO YOUR ENVIRONMENT

Devices can be configured to clone your organization’s network assets providing a realistic range of targets.

NEAR REAL-TIME ALERTS &
MONITORING

Alerts are delivered in near real-time via email, syslog or both. A ‘heartbeat’ is sent containing NARC® device details for ongoing monitoring. A management console provides host details and device configuration capabilities.

ONGOING UPDATES & ENHANCEMENTS

Updates and enhancements are deployed from secured servers onto devices regularly as they become available.

ENHANCED SECURITY FEATURES

Devices support only secure communications between the client and the server preventing unauthorized client access. Devices are hardened to CIS standards and images are penetration tested before deployment. Local settings and passwords are unique per device so no ‘key’ is available to access all devices. Additionally, any irregularities alert administrators and result in system isolation/shutdown.