Active Intrustion Detection.com

Download

About Active Intrusion Detection

Detect and trace data leaks as they happen with "Active Intrusion Detection". This software actively monitors your network for sensitive information sent insecurely, and instantly reports the details of the breach to a network administrator.

Free HTML5 Bootstrap Template

A Monitor, not a firewall

This does not prevent users from sending sensitive information insecurely, but it does detect and report such breaches, so that network administrators can take action to track the perpetrators. Data leaks can often be the result of careless employees, rather than hackers - and employees can be educated to correct use of sensitive data.

Secure your passwords

Don't let your employees send passwords via insecure channels, define a password fragment as a Red Flag to detect careless network users.

Secure credit cards

Never purchase anything online via an insecure website, define your credit card as a Red Flag to prevent insecure purchases

Secure your databases

Set up a dummy user with a strong password, any access to this dummy user could indicate a hacking attempt, and allows you reset all passwords

Free HTML5 Bootstrap Template by FREEHTML5.co
Getting started

What is Active Intrusion Detection?

Understanding Red Flags

"Red Flags" constitute sensitive information, be this server passwords, the company credit card, nuclear launch codes (*joke) etc. It should be long enough so that the "Red Flag" does not appear randomly in a stream of data that is completely unrelated, such as an image or video.

Also, it's recommended that you don't include complete passwords or credit card numbers as "Red Flags" since the detection software itself could be used as a vector.

What about secure data?

If the data is sent via HTTPS, a secure VPN, or otherwise encrypted, then this constitutes secure transfer, and will not trigger a warning. Secure transport of sensitive data is considered less of a security risk.

Is this foolproof?

No. It is designed to be used in conjunction with good network security policies, including Firewalls, and strong user authentication. This does not protect against hackers or careless employees, but it can help detect when a data leak occurs and allows network administrators the opportunity to quickly reset passwords before any unauthorised party uses the leaked passwords.

And how much does this cost?

It's Free! - Spread the word.

  • “ Your junior programmers may be authorised on the network, but do you want them to email your server passwords to their friends? ”

    — CTO

  • “ Is there a risk of a disgruntled employee downloading all your client contacts to sell to a competitor? ”

    — Sales Director

  • “ Would your secretary email your company credit card to that prince in Nigeria? :) ”

    — CEO

  1. Free HTML5 Bootstrap Template by FREEHTML5.co
  2. Free HTML5 Bootstrap Template by FREEHTML5.co
  3. Free HTML5 Bootstrap Template by FREEHTML5.co