Honeypots and Cyber Security in the News
Nova Network Security System Upgrade – The Nova upgrade includes improvements to the software architecture that mitigate vulnerabilities, enables future online software upgrades, and provides immediate notification of hostile attacks. Read More
Cyber-Security Threats Rise in Frequency, Complexity – eWeek article discussing top at-risk sites for cyber theft, with financial institutions topping the list. Software such as Nova adds an important layer in a cyber defense plan. Read Article
5 Reasons Every Company Should Have A Honeypot – Dark Reading article highlighting the benefits of using a honeypot to deter attacks. Read Article
Honeypots Lure Industrial Hackers Into the Open – MIT Technology Review article describing dummy water-plant control systems attracting immediate attention from hackers - suggesting these types of attacks happen to real industrial systems, too. Read Article
Time to Set Up the Honeypot – A new report describing the use of active defense tools, like Nova, is key to detecting today's cyber threats. Read Article
Verizon Data Breach Report – 78% of intrusions are relatively easy and states energy used to release security patches needs equivalent resources to make the network security system stronger. Nova uses software agents to work as decoys to catch intruders before they do harm. Read Report
Nova was featured on the Hacker Hotshots Web Pod Cast February 19, 2013. Listen to Pod Cast
Washington Post – article states firms are salting their servers with fake data to thwart hackers – reflecting a growing sense in industry that companies need to be more aggressive in fighting off intruders as the costs of digital espionage soar. Nova can automatically generate fake-machines, configured to match the operating systems and services that are already on the network. Read Article
Accenture Technology Vision 2013 report on Active Defense – Nova is mentioned in a section entitled "Fooling enemies more of the time..". Read Report
How Nova Works
Nova thwarts attempts by attackers to gain information about a private network by setting a large net of virtual decoys, or honeypots. The search for real machines and valuable data is like trying to find a needle in a haystack.
Nova identifies the attackers by their inevitable suspicious reconnaissance and efforts to connect through the honeypots.
Administrators are notified by email and data logs about the hostile activity and details regarding the source and behavior.
Nova Software Support and Downloads:
Nova support includes software updates, software licensing information, Nova Appliance User's Manual, software bulletins, and more.
The Nova appliance is a rack-mounted server with pre-configured Nova software. Just plug it in, follow a short start-up wizard and Nova will instantly begin to protect your vital information and detect attacks.
1 Ethernet Port
2 Ethernet Ports
8 Ethernet Ports
|Ideal for:||Small networks (20-30 nodes) with light traffic||Most Class C business networks||Up to 8 separate LANs in one location|
|Operating System:||Linux 64-bit||Linux 64-bit||Linux 64-bit|
|Processor:||Intel Dual Core 2.6 GHz, Celeron||Intel Dual Core 3 GHz||Intel Dual Core 3 GHz|
|Hard Drive:||250 GB, SATA 6 Gb/s||Dual 250 GB, SATA 6 Gb/s||Dual 250 GB, SATA 6 Gb/s|
|Memory:||1 GB SDRAM||4 GB SDRAM||4 GB SDRAM|
|Ethernet Ports:||1 Gigabit LAN Port||2 x Gigabit LAN Ports||8 x Gigabit LAN Ports|
|Dimensions:||19" x 14" x 1.7" (1U / half-depth)||19" x 14" x 1.7" (1U / half-depth)||19" x 14" x 1.7" (1U / half-depth)|
|Power Supply:||200 W||200 W||200 W High Efficiency|
|Nova Software Support and Downloads|