Technologies We Trust

Together with our trusted partners, Security7 Networks delivers the technology that keeps you safe


When it comes to stopping digital intruders, Canary by Thinkst is the last line of defense a network has.

Canary (taken from the Canary in the coal mine idiom), is the last line of defense a network has when it comes to stopping digital intruders from stealing valuable and proprietary information and causing immeasurable damage.

Why’s it Important?

Cyberattacks happen everyday. and they cost companies a lot of money. Juniper Research predicts cyberattacks will cost businesses a combined $2 Trillion by 2019.

The security landscape is peppered with products aimed to stop such things from happening but no matter how good your defenses are, the bad guys are constantly finding ways in.

Look at the fairly recent cyber attacks on companies like Target and Sony. In Target’s case, attackers installed malware on Target’s entire network, stole 40 million credit card numbers and in total cost the company $252 million dollars in damages. The attack on Sony cost $35 million dollars after malware completely destroyed their financial and IT systems.

Both attacks were perpetrated by hackers who gained access to the targeted systems days in advance and went unnoticed. Canary is designed to stop that.

How Thinkst is Different:

Canary is a honeypot. A honeypot is a a computer system that is set up to act as a decoy to lure cyberattackers, and to detect, deflect or study attempts to gain unauthorized access to information systems.

Like the classic canary in the coal mine, this canary warns you of danger you might not notice.

Canaries are deployed inside your network and communicate with the hosted console through DNS. This means the only network access your Canary needs is to a DNS server that’s capable of external queries, which is much less work than configuring border firewall rules for each device.

Simply choose a profile for the Canary device (such as a Window box, brandname router, or Linux server). If you want, you can further tweak the services your Canary runs. Perhaps you need a specific IIS server version or OpenSSH, or a Windows file share with real files constructed according to your own naming scheme (say, 2016-tenders.xls). Lastly, register your Canary with our hosted console for monitoring and notifications.

The only thing left to do is wait. Attackers who have breached your network, malicious insiders and other adversaries make themselves known by accessing your Canary. There’s little room for doubt. If someone browses a fileshare and opened a sensitive-looking document on your Canary (\fin_srv_02\Planning\2016_forecasts.xls) you’ll immediately be alerted to the problem.


  • Multiple configurations possible - Disguise Canary as a windows server, a router, linux server, etc.
  • Customizable Notification Center