Introducing G2.ai, the future of software buying.Try now
Inactive Profile: Need Admin Access?
No one has managed this profile for over a year.
If you work at Smokescreen, reclaim access to make changes.
Tracebit
Sponsored
Tracebit
Visit Website
Product Avatar Image
Smokescreen

By Smokescreen

Re-claim Profile

Re-claim your company’s G2 profile

This profile hasn’t been active for over a year.
If you work at Smokescreen, you can re-claim it to keep your company’s information up to date and make the most of your G2 presence.

    Once approved, you can:

  • Update your company and product details

  • Boost your brand's visibility on G2, search and LLMs

  • Access insights on visitors and competitors

  • Respond to customer reviews

  • We’ll verify your work email before granting access.

Re-claim
4.0 out of 5 stars
5 star
0%
3 star
0%
2 star
0%
1 star
0%

How would you rate your experience with Smokescreen?

Tracebit
Sponsored
Tracebit
Visit Website
It's been two months since this profile received a new review
Leave a Review

Smokescreen Reviews & Product Details

Pricing

Pricing provided by Smokescreen.

Basic

$7750 / yr
50 network decoys • Up to 3,250 endpoints • 1 site covered

Pro

$14,500 / yr
100 network decoys • Up to 7,500 endpoints • 15 sites covered

Smokescreen Media

Smokescreen Demo - Smokescreen Deception Platform
Quick to set up, doesn't need a lot of supervision, and catches whatever attack is the flavor of the month.
Smokescreen Demo - Detect targeted threats
Smokescreen's deception platform detects everything from recon and lateral movement to insider threats and APTs.
Smokescreen Demo - Decoys for every stage of the attack
Smokescreen has decoys that intercept attackers at every stage of the attack. You not only detect the attack before any damage is caused but can also collect valuable telemetry on the adversary.
Smokescreen Demo - Fully automated deployment
No manual customisation of decoys or supervision required. Smokescreen will study your network to generate realistic decoys that seamlessly blend in. The system also automatically creates some stand-out decoys that appear as lucrative targets which an attacker can't help but engage with.
Smokescreen Demo - Analysis in plain English
Most security solutions give you logs (we do too) that have to be parsed to make sense of. We reconstruct those attack logs into plain English sentences which tell you exactly what happened. In addition, you also get access to MITRE ATT&CK mapping and remediation recommendations.
Smokescreen Demo - A contextual risk score
Instead of the 'high, medium, low' categorization of alerts, Smokescreen gives you a risk scored based on how the attacker has behaved. This gives you more context to decide which alerts are worthy of investigation first.
Product Avatar Image

Have you used Smokescreen before?

Answer a few questions to help the Smokescreen community

Smokescreen Reviews (1)

Reviews

Smokescreen Reviews (1)

4.0
1 reviews

Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Verified User in Computer & Network Security
UC
Mid-Market (51-1000 emp.)
"Best tool for deception based detection and response."
What do you like best about Smokescreen?

Smokescreen decoys uses deception based technology for detecting insider threats, cloud threats, malware threats etc.Its management console is very good and centralised so anyone can easily manage decoys and hosts. Its agents are lightweight and can easily convert endpoint host in decoys. You can also integrate smokescreen with other security tools such as SIEM, EDR etc. Review collected by and hosted on G2.com.

What do you dislike about Smokescreen?

Nothing to dislike about this but sometime new handlers might confuse while using this. Ofcourse this is designed by considering overall attack surface but it's working is different than conventional tools. Review collected by and hosted on G2.com.

There are not enough reviews of Smokescreen for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Cynet - All-in-One Cybersecurity Platform Logo
Cynet - All-in-One Cybersecurity Platform
4.7
(246)
AutoXDR™ converges multiple technologies (EPP, EDR, UBA, Deception, Network Analytics and vulnerability management), with a 24/7 cyber SWAT team, to provide unparalleled visibility and defend all domains of your internal network: endpoints, network, files and users, from all types of attacks.
2
SentinelOne Singularity Endpoint Logo
SentinelOne Singularity Endpoint
4.7
(193)
Stop known and unknown threats on all platforms using sophisticated machine learning and intelligent automation. SentinelOne predicts malicious behavior across all vectors, rapidly eliminates threats with a fully-automated incident response protocol, and adapts defenses against the most advanced cyber attacks.
3
BOTsink Logo
BOTsink
4.0
(2)
The Attivo BOTsink solution stands guard inside your network, using high-interaction deception and decoy technology to lure attackers into engaging and revealing themselves.
4
DeceptionGrid Logo
DeceptionGrid
(1)
DeceptionGrid automates the deployment of a network of camouflaged malware traps that are intermingled with your real information technology resources.
5
The Illusive Platform Logo
The Illusive Platform
(0)
It a simple, adaptive approach that empowers your defenders to stop cyberthreats that could otherwise dwell in your environment for months or years.
6
Labyrinth Cyber Deception Platform Logo
Labyrinth Cyber Deception Platform
4.9
(16)
Labyrinth creates the illusion of a real infrastructure vulnerability for an attacker. The solution is based on Points, a smart host simulation. Each part of the simulation environment reproduces the services and content of an actual network segment. The system consists of four components that interact with each other. The main components of the Platform are: Admin VM is the main component. All collected information is sent to it for analysis. The console notifies the security team and sends the necessary data to third-party systems. Worker a host/virtual machine for deploying a set of Labyrinth network decoys (Points) on it. It can work in several VLANs simultaneously. Several Worker hosts can be connected to the same management console simultaneously. Points are intelligent hosts that mimic software services, content, routers, devices, etc. Points detect all malicious activities within the corporate network, providing complete coverage of all possible attack vectors. Seeder agents deployed on servers and workstations imitate the most attractive file artifacts for an attacker. By creating various decoy files, the agent directs attackers to network decoys (Points) through their contents. The Platform automatically deploys points (decoys) in the IT/OT network based on information about services and devices in the network environment. In addition, decoys can be deployed manually, providing users with a powerful tool to develop their unique deception platform based on their specific needs and best practices. The Labyrinth provokes an attacker to act and detects suspicious activity. As the attacker passes through the fake target infrastructure, the Platform captures all the details of the enemy. The security team receives information about the sources of threats, the tools used, the vulnerabilities exploited, and the attacker's behavior. At the same time, the entire real infrastructure continues to operate without any negative impact.
7
FortiDeceptor Logo
FortiDeceptor
4.0
(1)
FortiDeceptor is a non-intrusive, agentless deception platform designed to detect and neutralize active in-network threats by deploying decoy assets that mimic real network devices. By luring attackers into engaging with these decoys, FortiDeceptor enables early detection and response, effectively disrupting the attack kill chain before significant damage occurs. Key Features and Functionality: - Diverse Decoy Deployment: Supports a wide range of decoy operating systems, including Windows, Linux, SCADA, IoT, VoIP, ERP, Medical, SSL-VPN, and POS, allowing for realistic simulation of various network assets. - Deception Lures: Incorporates services, applications, or user simulations within decoy VMs to create authentic user environments, enhancing the effectiveness of the deception. - Token Distribution: Utilizes tokens—such as fake credentials, database connections, and configuration files—placed on real endpoints to guide attackers toward decoys, increasing the deception surface and influencing lateral movement. - Comprehensive Monitoring: Tracks attacker activities through detailed logging of events, incidents, and campaigns, providing insights into their methods and movements within the network. - Seamless Integration: Integrates with Fortinet Security Fabric and third-party security controls like SIEM, SOAR, EDR, and sandbox solutions to enhance visibility and accelerate response times. Primary Value and Problem Solved: FortiDeceptor addresses the critical need for proactive threat detection and response within networks. By creating a dynamic deception environment, it diverts attackers from sensitive assets, reduces dwell time, and minimizes false positives. This approach not only detects early reconnaissance and lateral movements but also provides detailed forensics and threat intelligence, enabling organizations to stay ahead of both known and unknown cyber threats. Additionally, its agentless design ensures minimal impact on network performance and stability, making it an effective solution for safeguarding IT, OT, and IoT environments.
8
Morphisec Logo
Morphisec
4.6
(12)
Morphisec Endpoint Threat Prevention thwarts hackers with their own strategies like deception, obfuscation, modification, and polymorphism.
9
LMNTRIX Logo
LMNTRIX
4.9
(10)
LMNTRIX provides a fully managed 24x7x365 Managed Detection & Response platform. The LMNTRIX multi-vector fully managed platform includes advanced network and endpoint threat detection, deceptions everywhere, analytics, full fidelity forensics, automated threat hunting on both the network and endpoints, and real-time threat intelligence technology, combined with deep/dark web monitoring which scales for small, medium, enterprise, cloud or SCADA/Industrial environments. We Prevent, Detect, Investigate, Validate, Contain and Remediate security incidents. The LMNTRIX platform/service includes full incident validation and remote incident response activities without the need for an incident-response-specific retainer; such activities may include malware analysis, identifying IOCs, automated and human-powered threat hunting, granular threat containment at endpoint level and specific guidance on remediation. The outcomes we deliver clients are fully validated incidents aligned to the kill chain and Mitre ATT&CK framework. No dumb alerts. These outcomes contain detailed investigative actions and recommendations that your organization follows to protect against the unknown, insider threat and malicious attacker.
10
Tracebit Logo
Tracebit
4.9
(12)
Tracebit generates and maintains tailored canary resources in your cloud environments, closing gaps in stock protection without time and cost intensive detection engineering.
Show More

Pricing Options

Pricing provided by Smokescreen.

Basic

$7750 / yr
50 network decoys • Up to 3,250 endpoints • 1 site covered

Pro

$14,500 / yr
100 network decoys • Up to 7,500 endpoints • 15 sites covered

Advanced

Request pricing
100+ network decoys • 7,500+ endpoints • Unlimited sites covered
Product Avatar Image
Smokescreen
View Alternatives