I was able to set up Canary to download my mail. Styled to distraction, and missing major features Set a unique notification sound for each account.Įasily review all files in a Conversation, without hunting. Get quick access to the actions that best suit your workflow. Handle emails when the time is right - today, tomorrow, or when you’re ready. Keep important emails at the top of your Inbox. Never miss important emails.Ĭhoose to get notifications for important emails only. Get easy access to the people that matter the most.
Save frequently used drafts to reuse them with 1-tap.Ĭompose emails via Canary’s gorgeous new true dark composer. Get notified as soon as your emails are read. Whether you’re after the best design, features, or security, Canary “raises the bar and sits firmly on top” - The Next WebĬanary supports all your Gmail, iCloud, Office365, Yahoo, IMAP & Exchange accounts.Īccess all your Contacts’ emails, files & even social media profiles in one place.Įncrypt emails seamlessly with Canary’s zero-setup encryption, or via PGP. More information will be available at shortly.Email, done right. The initial Canary package will be priced at $5 000, including two sensors, the management console, and two annual licences for updates, support and maintenance. Until then, you should be able to safely ignore it." The console may look simple, but it is also a key part of the product: to conceal its real nature, the Canary hides its telemetry within normal-looking network behaviour. When something happens, you'll get an SMS or e-mail. "We have a simple console, but we don't want customers to look at it. The Canary package offers a management console to set up devices and manage alerts, but it is deliberately simple, Meer said. But, if the same user scans a Canary pretending to be a Web server, he definitely deserves investigation." "If a user looks at a potentially sensitive document on a Canary pretending to be a fileserver, that's interesting, but he might just be curious. But "all it needs to do is get off a single alert to do its job", Meer noted.ĭeploying several sensors in various configurations allows the customer to detect patterns of behaviour too, Meer said. "In the future, we'd like to make an open source version which allows the community to contribute new profiles," Meer said.Īlthough the device is as thoroughly camouflaged as possible, an attacker could conceivably unmask its true nature, or even attack it directly. Out of the box, the system can be configured to mimic several permutations of hardware, operating system and service, from network routers or fileservers to Web servers and storage devices. "We spent months nailing down every obstacle to getting the Canary up and running with the minimum of configuration and effort," Meer said. The result is Thinkst's Canary, a customised Linux stack, initially available as a compact Raspberry Pi-based unit deployable in just two-and-a-half minutes. Meer wanted to short-circuit that problem, offering a self-contained, automated unit that would do nothing more than sound the alarm at the first sign of trouble. Honeypots are often deployed to detect external attackers, but rarely internal ones, because they simply add to the volume of security log data the IT team must filter and process. The concept is based on the principle of detecting the first signs of lateral movement an attacker might take, Thinkst founder Haroon Meer told ITWeb.Īfter establishing an initial foothold, frequently through social engineering or phishing, an attacker must move through the network, seeking valuable information and additional vulnerable systems. It then alerts operators, thus avoiding the need to filter logs looking for warning signs. The Canary product is a customised honeypot that can mimic a genuine network resource, like a fileserver or router, waiting for signs that an intruder is looking for vulnerable targets. Thinkst Applied Research has released an intrusion detection sensor intended to provide quick and effective detection of malicious activity on a network. Thinkst's concept is based on the principle of detecting the first signs of lateral movement an attacker might take, says founder Haroon Meer.