Hoxey System Architecture Overview
A technical overview of the Hoxey platform architecture, detailing its Zero-Trust design, core components, and how cloud-hosted honeypots are securely provisioned, isolated, and managed in production.
Comprehensive guides and documentation for deploying and managing Hoxey honeypot security platform
A technical overview of the Hoxey platform architecture, detailing its Zero-Trust design, core components, and how cloud-hosted honeypots are securely provisioned, isolated, and managed in production.
A detailed technical overview of Hoxey’s security-first, Zero-Trust infrastructure, covering device isolation, data minimization, layered isolation, encryption, RBAC, and operational best practices to ensure secure and resilient cloud honeypots.
A step-by-step guide for deploying Hoxey to protect your network, including account setup, template selection, device placement, and further customization for effective detection and deception.
This guide explains how to quickly identify a compromised host from the IP address present in the Event.
Comprehensive documentation of the Events page in Hoxey, explaining security alerts generated by honeypots, event anatomy, severity levels, collaboration utilities, and the complete event lifecycle for effective monitoring and triage.
Learn how to manage your honeypot devices, monitor their status, configure virtual machines, and customize behavior through init scripts, event synchronization, and MAC address settings.
Learn how to create, configure, and manage filters to automatically suppress specific security alerts, reduce noise, and focus on relevant events in the Dashboard.
Learn how to configure real-time notification channels to receive security alerts on third-party platforms, control alert severity, and ensure continuous monitoring without constantly checking the Dashboard.
Learn how Hoxey manages team members, the differences between Seat and Owner accounts, and how to create and manage users, permissions, and access management procedures within the customer account.
Learn how to effortlessly manage your Hoxey subscription, from setting up your account and receiving a personalized quote to secure payments and subscription management
Learn how Audit Trails provide full visibility into system and user actions, ensuring transparency, accountability, and secure access to event records with immutability and retention policies.
Join The Hive for curated attacker insights and cybersecurity webinars - easily explained from an actual hacker