Active Defense Engine (ADE)
Zero false positives. Every alert is a confirmed intrusion signal. Deception-based detection with SOAR automation, consequence-based risk scoring, and MITRE ATT&CK mapping.
Deception Layer
A full-spectrum deception toolkit that deploys realistic decoys, honeypots, canary files, and honey credentials across your environment. Every interaction is a confirmed intrusion signal.
30+ Decoy Templates
SSH, RDP, SMB, web admin panels, databases (MSSQL, MySQL), AD service accounts, and OT/ICS protocols. Deploy realistic decoys across IT and OT environments in minutes.
5 Live Honeypot Types
Full-interaction honeypots that capture attacker sessions end-to-end: SSH (Cowrie), SSH-Cisco, web admin panel, SMB file share, and RDP workstation.
Honeyports
Lightweight TCP listeners with three engagement modes: tarpit to slow scanners, banner spoofing to fingerprint tools, and redirect to route attackers into instrumented environments.
Canary Files
Drop trackable documents across file shares and endpoints. HTML, PDF, DOCX, and XLSX formats with embedded beacons that fire on open -- no macros required.
Honey Credentials
Seed realistic credentials that trigger high-confidence alerts on use. AD accounts, API keys, SSH keys, database credentials, VPN tokens, and WiFi PSKs.
Realism Engine
Environment-consistent naming templates, OS fingerprint profiles, realistic service banners, and breadcrumb campaigns that guide adversaries toward instrumented assets.
Detection Pipeline
An 8-stage automated pipeline that classifies, scores, profiles, and enriches every detection in seconds -- not hours.
8-Stage Automated Pipeline
MITRE ATT&CK technique classification
Incident deduplication and grouping
Consequence-based risk scoring
Adversary session profiling and TTP extraction
Coverage scoring and confidence calculation
Deployment orchestration and asset updates
Asset inventory synchronization
IOC correlation across 7+ enrichment sources
Click any IP anywhere in the platform for instant full investigation
Every IP address in ADE is clickable. One click opens a full investigation panel with GeoIP location, threat intelligence enrichment from 7+ sources, complete attack history across all decoys, SSH session replay with terminal output, and one-click action buttons for blocking, enriching, or exporting.
SOAR & Playbook Engine
Trigger-based automation with condition logic, cooldown prevention, and full execution history tracking.
6 Trigger Types
7 Action Types
Playbooks support conditional logic with field-based matching, configurable cooldown periods to prevent duplicate actions, and full execution history with status tracking and error reporting.
Consequence-Based Risk Scoring
The Consequence Risk Model (CRM v1.0) scores every incident based on real-world business impact -- not just technical severity.
CRM v1.0 Scoring Weights
Consequence Categories
Integrations
| Category | Integrations |
|---|---|
| SIEM/SOAR | Splunk, Datadog, CrowdStrike, custom webhook (JSON, CEF, syslog) |
| Notifications | Slack, PagerDuty, email (SendGrid), HMAC-signed webhooks |
| Threat Intel | AbuseIPDB, GreyNoise, Shodan, VirusTotal, ThreatFox, URLhaus, OTX, MISP |
| Export | CSV, JSON, STIX 2.1, Splunk SPL, Sigma rules, PDF reports |
OT/ICS Coverage
Purpose-built deception for operational technology environments. Detect lateral movement and reconnaissance in networks where traditional detection fails.
Protocol Emulation
PLC emulation (Siemens S7), HMI interfaces, Modbus, EtherNet/IP, and DNP3. Deploy decoys that look and respond like real industrial control systems.
ICS-Specific Detection
41 ICS-specific MITRE ATT&CK techniques mapped. Safety canaries for critical process monitoring. Network baselines to detect anomalous OT traffic patterns.
See ADE in action
Zero false positives. Consequence-based risk scoring. Full MITRE ATT&CK coverage. See how ADE transforms deception into a governed detection program.



