{"id":2418,"date":"2025-03-13T09:57:54","date_gmt":"2025-03-13T09:57:54","guid":{"rendered":"https:\/\/inprotech.es\/?p=2418"},"modified":"2025-03-18T13:17:23","modified_gmt":"2025-03-18T13:17:23","slug":"honeypot-new-threat-detection-functionality-of-inprotech-guardian","status":"publish","type":"post","link":"https:\/\/inprotech.es\/en\/honeypot-new-threat-detection-functionality-of-inprotech-guardian\/","title":{"rendered":"Honeypot: New threat detection functionality of InprOTech Guardian"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">In the current context, industrial networks are facing an increasing number of cyber-attacks, therefore, more proactive and specialized security solutions are required. InprOTech Guardian emerges as an advanced monitoring tool, designed to protect critical infrastructures without disrupting their operations.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With the addition of its new capability. Guardian enables the incorporation of a honeypot, which acts as a decoy, attracting and recording malicious activity. This functionality allows potential attacks to be identified at an early stage, providing plant operators with key information to mitigate risks quickly and effectively, which significantly strengthens network security and optimises the performance of our tool.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This article written by <\/span><a href=\"https:\/\/inprotech.es\/en\/equipo\/samuel-pampillon-roa\/\"><span style=\"font-weight: 400;\">Samuel Pampill\u00f3n<\/span><\/a><span style=\"font-weight: 400;\">, software developer at InprOTech, discusses the honeypot concept, the rationale behind our InprOTech Guardian tool and how the fusion of these technologies offers a considerable boost to the security of industrial environments.<\/span><\/p>\n\n<p>&nbsp;<\/p>\n<h2><b>Why InprOTech GUARDIAN?<\/b><\/h2>\n<p><a href=\"https:\/\/inprotech.es\/en\/guardian\/\"><span style=\"font-weight: 400;\">InprOTech Guardian<\/span><\/a><span style=\"font-weight: 400;\"> is a cybersecurity tool specifically designed and developed to protect industrial networks. Its main objective is to monitor the traffic generated in production environments and analyse it based on a combination of static, an IDS and AI-powered rules. This approach makes it possible to effectively identify threats and issue alerts in real time, directly notifying plant managers and\/or operators of possible attacks or operational failures, enabling them to anticipate and reduce the impact.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Particularly noteworthy is the incorporation of Machine Learning and Intelligence algorithms and technology, which allows it to dynamically adapt to complex behavioural patterns to analyse traffic, statistics and even process variables.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In addition, InprOTech GUARDIAN allows to inventory wired or wireless industrial assets, manage plant vulnerabilities, analyse traffic, or generate service reports.<\/span><\/p>\n<h2><b>\u00bfWhat is a Honeypot?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">A honeypot, commonly known as a \u201ctrap system\u201d or \u201cdecoy\u201d, is a highly effectively security tool. Its purpose is to simulate a real device within the network, appearing to be vulnerable to lure potential attackers into believing that they have accessed a real system. However, this environment is completely isolated, allowing detailed monitoring and analysis of the techniques and vulnerabilities they are trying to exploit, making it a powerful solution for threat detection and analysis.<\/span><\/p>\n<h2><b>How is it used?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">When a honeypot is installed, it is usually deployed on a machine that is not in production. This system acts as the target of the attack, allowing it to gather valuable information about the tactics employed by the attackers and then apply protection measures on the critical devices of the company.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To implement them correctly, is essential to configure the infrastructure in such a way that any external attack entering the network is first directed towards the honeypot. In this way, attackers will focus their efforts on this trap system rather than on critical assets.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It is important to keep in mind that honeypots, like any other computer system, can have fails or vulnerabilities. Moreover, their capabilities are limited to detecting and logging attacks specifically targeted against them. They cannot prevent or stop threats that affect other devices on the network. They should therefore be seen as a complementary tool within a broader cyber security strategy.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">When implementing a honeypot in an infrastructure of a company, there are two main options:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Physical honeypot:<\/b><span style=\"font-weight: 400;\"> consists of a dedicated machine, integrated into the network with its own IP address. It presents itself as a legitimate server, but in reality, it is highly protected and monitored, sending detailed information about the attackers to administrators for analysis<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Virtual honeypot:<\/b><span style=\"font-weight: 400;\"> runs within a virtualization environment, sharing resources with other systems in a physical server. It is a more costs and resources efficient option, as it allows for threat detection without the need for dedicated hardware.<\/span><\/li>\n<\/ul>\n<p><b>Honeypot types<\/b><\/p>\n<p><span style=\"font-weight: 400;\">We can classify honeypots into five main categories, according to<\/span> <span style=\"font-weight: 400;\">their interaction level and purpose.<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Highly interactive honeypot:\u00a0 <\/b><span style=\"font-weight: 400;\">simulates a full operating system with real services and applications, allowing deep interaction with attackers. They are highly sophisticated and collect detailed data on intrusion tactics and vulnerability exploitation.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Low interaction honeypot: <\/b><span style=\"font-weight: 400;\">these simulate specific services, such as Modbus, OPC UA, TCP or web servers, with limited functionality. They are easier to implement and maintain than high interaction ones, but still provide valuable information.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Honeynets:<\/b><span style=\"font-weight: 400;\"> consists of a network of interconnected honeypots that simulate a real infrastructure, allowing attacks to be monitored from multiple points. It provides a broader view of attackers\u2019 methods and behaviour in complex networks.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Hardware honeypots:<\/b><span style=\"font-weight: 400;\"> physical device designed to simulate services and vulnerabilities within a network. It is used in environments where virtualization is not feasible, such as industrial or IoT networks.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Malware honeypots: <\/b><span style=\"font-weight: 400;\">focus on attracting malware for analysis. It simulates known vulnerabilities and allows new variants to be studied, helping to develop more effective defence measures<\/span><\/li>\n<\/ul>\n<h2><b>Combining technologies<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The integration of the honeypot in InprOTech GUARDIAN represents a significant advance in the monitoring and protection of industrial networks. In this first implementation, we have incorporated a low interaction honeypot, specifically designed to simulate Modbus, one of the most widely used protocols in industrial infrastructures. Thanks to this capability, we can attract and log malicious access attempts without compromising the security of real systems.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">By combining the threat detection capabilities present in InprOTech GUARDIAN with the power of honeypots as trap systems, we have achieved a synergy that takes cyber security to a new level.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This new functionality not only detects attacks in their early stages, but also collects and analyses data on intrusion attempts, providing key information to understand the tactics used by attackers and improve the cyber security strategies of the company<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With this new implementation, InprOTech, following our philosophy of innovation and commitment to industrial security, reinforces our capacity for anticipation and response, offering our clients a more robust, adaptable and effective solution in the defence of their critical infrastructures<\/span><\/p>\n<h2><b>Benefits<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The use of trap systems such as honeypots can be key to improving cyber security planning and has multiple benefits:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Early identification of threats: <\/b><span style=\"font-weight: 400;\">they enable proactive detection of attacks by attracting attackers before they can compromise real systems. This early identification provides a significant advantage in incident response and mitigation of potential damage.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Threat intelligence gathering <\/b><span style=\"font-weight: 400;\">by recording the activity of attackers, honeypots provide key information about their tactics, techniques and procedures, enabling better understanding of threats and more effective reinforcement of defences.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Training and coaching: <\/b><span style=\"font-weight: 400;\">the implementation of honeypots provides an opportunity to train security personal in threat detection and response, allowing them to improve their skills by analysing attacks in a controlled environment.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Attack diversion:<\/b><span style=\"font-weight: 400;\"> by luring attackers into simulated environments, honeypots divert attention away from real systems, reducing the risk of compromise and damage to critical infrastructure.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Security system assessment:<\/b><span style=\"font-weight: 400;\"> assesses the effectiveness of existing defences by analysing how attackers attempt to evade them, providing key information to optimise and strengthen security measures.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Forensic investigation: <\/b><span style=\"font-weight: 400;\">honeypots provide valuable data for forensic investigations, allowing to reconstruct the flow of events and assess the scope and impact of an attack through captured activity logs.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Protection against unknown attacks:<\/b><span style=\"font-weight: 400;\"> honeypots detect attacks that may go undetected by conventional security tools, providing an additional layer of protection against unknown threats and advanced attacks.<\/span><\/li>\n<\/ul>\n<h2><b>Summary<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">In an environment where cyber threats are constantly evolving, the security of industrial networks requires innovative and adaptive solutions. InprOTech GUARDIAN is an advanced threat detection and monitoring tool designed specifically for critical infrastructures.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Now, with the integration of a specialized low-interaction honeypot, GUARDIAN takes industrial cyber security a step further. This technology acts as a decoy that simulates a real device, attracting potential attackers and recording their intrusion attempts. With this fusion of advanced monitoring and deception techniques, we not only improve risk visibility, but also significantly strengthen incident response capabilities.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">At InprOTech, we remain committed to developing solutions that not only detect threats, but transform knowledge into proactive strategies for protecting industrial environments.<\/span><\/p>\n<h2><b>Contact Us<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">If you found this new feature interesting and would like to learn more about it, please do not hesitate to contact us by clicking <\/span><a href=\"https:\/\/inprotech.es\/en\/contact\/\"><span style=\"font-weight: 400;\">here<\/span><\/a><span style=\"font-weight: 400;\">. Our team will be ready to help you at any time.<\/span><\/p>\n<h2><b>Resources\u00a0<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">[1] <\/span><a href=\"https:\/\/inprotech.es\/guardian\/\"><span style=\"font-weight: 400;\">Guardian &#8211; InprOTech<\/span><\/a><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">[2] <\/span><a href=\"https:\/\/www.incibe.es\/empresas\/blog\/honeypot-una-trampa-para-los-ciberdelincuentes#:~:text=Un%20honeypot%20es%20una%20herramienta,poder%20evitarlos%20en%20el%20futuro.\"><span style=\"font-weight: 400;\">Honeypot: una trampa para los ciberdelincuentes | Empresas | INCIBE<\/span><\/a><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">[3] <\/span><a href=\"https:\/\/www.incibe.es\/sites\/default\/files\/contenidos\/guias\/doc\/incibe-cert_guia_implantacion_honeypot_industrial.pdf\"><span style=\"font-weight: 400;\">incibe-cert_guia_implantacion_honeypot_industrial.pdf<\/span><\/a><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">[4] <\/span><a href=\"https:\/\/www.crowdstrike.com\/en-us\/cybersecurity-101\/exposure-management\/honeypots\/\"><span style=\"font-weight: 400;\">What is a Honeypot in Cybersecurity? | CrowdStrike<\/span><\/a><span style=\"font-weight: 400;\">\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">[5] <\/span><a href=\"https:\/\/www.redeszone.net\/tutoriales\/seguridad\/que-es-honeypot\/\"><span style=\"font-weight: 400;\">Qu\u00e9 son los Honeypot, para qu\u00e9 sirven y c\u00f3mo funcionan<\/span><\/a><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">[6] <\/span><a href=\"https:\/\/cibersafety.com\/honeypots-trampa-ciberdelincuentes\/#tipos-de-honeypots\"><span style=\"font-weight: 400;\">Honeypots: Atrapa a los ciberatacantes | Cibersafety<\/span><\/a><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the current context, industrial networks are facing an increasing number of cyber-attacks, therefore, more proactive and specialized security solutions are required. InprOTech Guardian emerges as an advanced monitoring tool, designed to protect critical infrastructures without disrupting their operations. With the addition of its new capability. Guardian enables the incorporation of a honeypot, which acts&#8230;<\/p>\n","protected":false},"author":1,"featured_media":2419,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10],"tags":[],"class_list":["post-2418","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Honeypot: New threat detection functionality of InprOTech Guardian - InprOTech<\/title>\n<meta name=\"description\" content=\"Discover how InprOTech Guardian integrates a honeypot to detect cyber threats in industrial networks, enhancing security and anticipating attacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/inprotech.es\/en\/honeypot-new-threat-detection-functionality-of-inprotech-guardian\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Honeypot: New threat detection functionality of InprOTech Guardian - InprOTech\" \/>\n<meta property=\"og:description\" content=\"Discover how InprOTech Guardian integrates a honeypot to detect cyber threats in industrial networks, enhancing security and anticipating attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/inprotech.es\/en\/honeypot-new-threat-detection-functionality-of-inprotech-guardian\/\" \/>\n<meta property=\"og:site_name\" content=\"InprOTech\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-13T09:57:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-18T13:17:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/inprotech.es\/wp-content\/uploads\/2025\/03\/Honeypot-La-nueva-funcionalidad-de-InprOTech-Guardian-para-la-deteccion-de-amenazas-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/honeypot-new-threat-detection-functionality-of-inprotech-guardian\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/honeypot-new-threat-detection-functionality-of-inprotech-guardian\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/inprotech.es\\\/#\\\/schema\\\/person\\\/cb0ae1292b18b48c1e89b0e4e7ef15d9\"},\"headline\":\"Honeypot: New threat detection functionality of InprOTech Guardian\",\"datePublished\":\"2025-03-13T09:57:54+00:00\",\"dateModified\":\"2025-03-18T13:17:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/honeypot-new-threat-detection-functionality-of-inprotech-guardian\\\/\"},\"wordCount\":1381,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/honeypot-new-threat-detection-functionality-of-inprotech-guardian\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/inprotech.es\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/Honeypot-La-nueva-funcionalidad-de-InprOTech-Guardian-para-la-deteccion-de-amenazas-1.jpg\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/inprotech.es\\\/en\\\/honeypot-new-threat-detection-functionality-of-inprotech-guardian\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/honeypot-new-threat-detection-functionality-of-inprotech-guardian\\\/\",\"url\":\"https:\\\/\\\/inprotech.es\\\/en\\\/honeypot-new-threat-detection-functionality-of-inprotech-guardian\\\/\",\"name\":\"Honeypot: New threat detection functionality of InprOTech Guardian - InprOTech\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/inprotech.es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/honeypot-new-threat-detection-functionality-of-inprotech-guardian\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/honeypot-new-threat-detection-functionality-of-inprotech-guardian\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/inprotech.es\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/Honeypot-La-nueva-funcionalidad-de-InprOTech-Guardian-para-la-deteccion-de-amenazas-1.jpg\",\"datePublished\":\"2025-03-13T09:57:54+00:00\",\"dateModified\":\"2025-03-18T13:17:23+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/inprotech.es\\\/#\\\/schema\\\/person\\\/cb0ae1292b18b48c1e89b0e4e7ef15d9\"},\"description\":\"Discover how InprOTech Guardian integrates a honeypot to detect cyber threats in industrial networks, enhancing security and anticipating attacks.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/honeypot-new-threat-detection-functionality-of-inprotech-guardian\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/inprotech.es\\\/en\\\/honeypot-new-threat-detection-functionality-of-inprotech-guardian\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/honeypot-new-threat-detection-functionality-of-inprotech-guardian\\\/#primaryimage\",\"url\":\"https:\\\/\\\/inprotech.es\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/Honeypot-La-nueva-funcionalidad-de-InprOTech-Guardian-para-la-deteccion-de-amenazas-1.jpg\",\"contentUrl\":\"https:\\\/\\\/inprotech.es\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/Honeypot-La-nueva-funcionalidad-de-InprOTech-Guardian-para-la-deteccion-de-amenazas-1.jpg\",\"width\":1200,\"height\":630},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/honeypot-new-threat-detection-functionality-of-inprotech-guardian\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/inprotech.es\\\/en\\\/pagina-de-inicio\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Honeypot: New threat detection functionality of InprOTech Guardian\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/inprotech.es\\\/#website\",\"url\":\"https:\\\/\\\/inprotech.es\\\/\",\"name\":\"InprOTech\",\"description\":\"The Cybersecurity Solution for the Industrial Environment\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/inprotech.es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/inprotech.es\\\/#\\\/schema\\\/person\\\/cb0ae1292b18b48c1e89b0e4e7ef15d9\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d903daf71b546605502fd9841b9dc598cc8d3a04ee26680ca18eb3633e5209be?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d903daf71b546605502fd9841b9dc598cc8d3a04ee26680ca18eb3633e5209be?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d903daf71b546605502fd9841b9dc598cc8d3a04ee26680ca18eb3633e5209be?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/inprotech.es\"],\"url\":\"https:\\\/\\\/inprotech.es\\\/en\\\/author\\\/moon\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Honeypot: New threat detection functionality of InprOTech Guardian - InprOTech","description":"Discover how InprOTech Guardian integrates a honeypot to detect cyber threats in industrial networks, enhancing security and anticipating attacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/inprotech.es\/en\/honeypot-new-threat-detection-functionality-of-inprotech-guardian\/","og_locale":"en_US","og_type":"article","og_title":"Honeypot: New threat detection functionality of InprOTech Guardian - InprOTech","og_description":"Discover how InprOTech Guardian integrates a honeypot to detect cyber threats in industrial networks, enhancing security and anticipating attacks.","og_url":"https:\/\/inprotech.es\/en\/honeypot-new-threat-detection-functionality-of-inprotech-guardian\/","og_site_name":"InprOTech","article_published_time":"2025-03-13T09:57:54+00:00","article_modified_time":"2025-03-18T13:17:23+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/inprotech.es\/wp-content\/uploads\/2025\/03\/Honeypot-La-nueva-funcionalidad-de-InprOTech-Guardian-para-la-deteccion-de-amenazas-1.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/inprotech.es\/en\/honeypot-new-threat-detection-functionality-of-inprotech-guardian\/#article","isPartOf":{"@id":"https:\/\/inprotech.es\/en\/honeypot-new-threat-detection-functionality-of-inprotech-guardian\/"},"author":{"name":"admin","@id":"https:\/\/inprotech.es\/#\/schema\/person\/cb0ae1292b18b48c1e89b0e4e7ef15d9"},"headline":"Honeypot: New threat detection functionality of InprOTech Guardian","datePublished":"2025-03-13T09:57:54+00:00","dateModified":"2025-03-18T13:17:23+00:00","mainEntityOfPage":{"@id":"https:\/\/inprotech.es\/en\/honeypot-new-threat-detection-functionality-of-inprotech-guardian\/"},"wordCount":1381,"commentCount":0,"image":{"@id":"https:\/\/inprotech.es\/en\/honeypot-new-threat-detection-functionality-of-inprotech-guardian\/#primaryimage"},"thumbnailUrl":"https:\/\/inprotech.es\/wp-content\/uploads\/2025\/03\/Honeypot-La-nueva-funcionalidad-de-InprOTech-Guardian-para-la-deteccion-de-amenazas-1.jpg","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/inprotech.es\/en\/honeypot-new-threat-detection-functionality-of-inprotech-guardian\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/inprotech.es\/en\/honeypot-new-threat-detection-functionality-of-inprotech-guardian\/","url":"https:\/\/inprotech.es\/en\/honeypot-new-threat-detection-functionality-of-inprotech-guardian\/","name":"Honeypot: New threat detection functionality of InprOTech Guardian - InprOTech","isPartOf":{"@id":"https:\/\/inprotech.es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/inprotech.es\/en\/honeypot-new-threat-detection-functionality-of-inprotech-guardian\/#primaryimage"},"image":{"@id":"https:\/\/inprotech.es\/en\/honeypot-new-threat-detection-functionality-of-inprotech-guardian\/#primaryimage"},"thumbnailUrl":"https:\/\/inprotech.es\/wp-content\/uploads\/2025\/03\/Honeypot-La-nueva-funcionalidad-de-InprOTech-Guardian-para-la-deteccion-de-amenazas-1.jpg","datePublished":"2025-03-13T09:57:54+00:00","dateModified":"2025-03-18T13:17:23+00:00","author":{"@id":"https:\/\/inprotech.es\/#\/schema\/person\/cb0ae1292b18b48c1e89b0e4e7ef15d9"},"description":"Discover how InprOTech Guardian integrates a honeypot to detect cyber threats in industrial networks, enhancing security and anticipating attacks.","breadcrumb":{"@id":"https:\/\/inprotech.es\/en\/honeypot-new-threat-detection-functionality-of-inprotech-guardian\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/inprotech.es\/en\/honeypot-new-threat-detection-functionality-of-inprotech-guardian\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/inprotech.es\/en\/honeypot-new-threat-detection-functionality-of-inprotech-guardian\/#primaryimage","url":"https:\/\/inprotech.es\/wp-content\/uploads\/2025\/03\/Honeypot-La-nueva-funcionalidad-de-InprOTech-Guardian-para-la-deteccion-de-amenazas-1.jpg","contentUrl":"https:\/\/inprotech.es\/wp-content\/uploads\/2025\/03\/Honeypot-La-nueva-funcionalidad-de-InprOTech-Guardian-para-la-deteccion-de-amenazas-1.jpg","width":1200,"height":630},{"@type":"BreadcrumbList","@id":"https:\/\/inprotech.es\/en\/honeypot-new-threat-detection-functionality-of-inprotech-guardian\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/inprotech.es\/en\/pagina-de-inicio\/"},{"@type":"ListItem","position":2,"name":"Honeypot: New threat detection functionality of InprOTech Guardian"}]},{"@type":"WebSite","@id":"https:\/\/inprotech.es\/#website","url":"https:\/\/inprotech.es\/","name":"InprOTech","description":"The Cybersecurity Solution for the Industrial Environment","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/inprotech.es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/inprotech.es\/#\/schema\/person\/cb0ae1292b18b48c1e89b0e4e7ef15d9","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d903daf71b546605502fd9841b9dc598cc8d3a04ee26680ca18eb3633e5209be?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d903daf71b546605502fd9841b9dc598cc8d3a04ee26680ca18eb3633e5209be?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d903daf71b546605502fd9841b9dc598cc8d3a04ee26680ca18eb3633e5209be?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/inprotech.es"],"url":"https:\/\/inprotech.es\/en\/author\/moon\/"}]}},"_links":{"self":[{"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/posts\/2418","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/comments?post=2418"}],"version-history":[{"count":2,"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/posts\/2418\/revisions"}],"predecessor-version":[{"id":2442,"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/posts\/2418\/revisions\/2442"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/media\/2419"}],"wp:attachment":[{"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/media?parent=2418"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/categories?post=2418"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/tags?post=2418"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}