Why Divert
Legacy deception was built for a different era
Honeypots and internal VMs were groundbreaking in 2005. Attackers have evolved. Your deception strategy should too.
Internal Deception
Heavy VMs, sparse coverage, zero blocking
Internal honeypots require VMs, dedicated hardware, AD-integration, and your valuable time. But go ahead anyways — deploy 10 to 50 of these across your network with 1000s of assets. It'll be trivial for an internal attacker with a foothold to sidestep these.
When they do trip one, you get an alert buried in 10,000 others. No blocking. No action.
Internet Honeypots
Obvious traps that only fool bots
Plain IPs with no DNS integration. Self-signed or missing SSL certificates. Names like ssh-server1 that sophisticated attackers spot instantly.
Data forwarded to a dashboard nobody checks. Bots stumble in by accident. Real attackers walk right past.
What if deception was actually invisible?
Divert's decoys use real DNS names in your namespace. Services present with trusted SSL certificates. Content mirrors your actual services. Zero maintenance. No monitoring burden. Decoys your own team can't distinguish from production.
DNS-Integrated Cyber Deception
Camouflaged. Chained. Blocking.
Decoys blend seamlessly into your existing internet presence — no hardware to deploy, no maintenance, and no monitoring. Chained decoys draw attackers through realistic attack scenarios and block them instantly at your network and cloud edges. Built for the AI era, not the early 2000s. Effective against human operators, automated scanners, and offensive AI agents alike.
The Verdict
One of these actually stops attacks
| Capability | Internal VMs | Internet Honeypots | Divert |
|---|---|---|---|
| Catches humans | sometimes | No | Yes |
| Catches bots | No | sometimes | Yes |
| Catches AI agents | sometimes | No | Yes |
| Blocks Threats | No | No | Yes |
| Real DNS names | N/A | No | Yes |
| Environmental mimicry | No | No | Yes |
| Trusted SSL | rarely | rarely | Yes |
| Deploy in minutes | No | No | Yes |
| 100% signal | No | No | Yes |
Internal VMs
Internet Honeypots
Divert
Attack Lifecycle
Watch an attack unfold. Watch Divert end it.
Every command below ran inside a Divert decoy. The attacker enumerated DNS, exploited a “vulnerable” staging server, escalated privileges — and never touched a real asset.
See the difference
Schedule a demo to preview the industry's first cyber deception platform built for the AI-era, and we'll share a preview of how Divert camouflages itself on your edge.