Make it easier to detect intrusions into your system with this security tool. HoneyPoint Personal Edition's standard Windows dialog-style interface literally takes seconds to decipher.
System administrators and coffeehouse Wi-Fi users alike will appreciate the ease of using this application. Through this application, you easily set up faux Web and e-mail services. Then sit back and HoneyPoint PE logs the attempts to peek into your system. Using the logged IP and port attempt log, the savvy user can tweak and tune her firewall. The supplied information also is useful to analyze internal network Trojans searching for new hosts.
Now the bad news; during our tests HoneyPoint PE failed to log internal attempts to access our system. A quick read of the help file reveals no limitations, save only a 15-minute active session before HoneyPoint closes. All users would have appreciated default Web page and UDP port codes. Nevertheless, this security tool could be helpful to select users willing to take a chance on the registered version.
Network and System Administrators, along with your Power Users, represent not only valuable members of your team, but in the eyes of attackers they also represent prime targets. Their workstations and notebook systems usually contain immense amounts of valuable data and may even hold keys to the kingdom like passwords, certificates and other confidential network details.
HPPE empowers these technical users to change their systems from attacker target to security sensor. Using HoneyPoint technology, they can configure their systems to capture attackers targeting them and take immediate action to trace, analyze and mitigate the threats. Easy to use, ultra-configurable, and highly effective HPPE is a Power User's best friend.
Shop your favorite products and we’ll find the best deal with a single click. Designed to make shopping easier.