About SafeHouse

Small businesses are underappreciated by big cyber. We're giving security to the little guy.

SafeHouse is a suite of hyper-secure, affordable variable-interaction honeypots and honeypot IDS's that help protect production systems, aimed at small enterprises.



Honeypots are an often overlooked cybersecurity measure and a powerful research tool. A honeypot is a decory system or service intentionally left vulnerable to hackers. The goal of a honeypot is to collect data from intruders and divert their attention from the main infrastructure, which is easy because any connection to the honeypot is considered hostile.


Honeypots range in complexity from intercepting packets to emulating services to imitating fully-fledged components in the organization's infrastructure. Successful honeypots appear convincing to hackers and collect useful data while staying isolated from the rest of the infrastructure.



Honeypots have two main purposes: diverting hackers and collecting data.


Production honeypots are used as a security measure by corporations. They are meant to fool hackers into thinking they've infiltrated the company's production systems when they are only interacting with a decoy. The company can enact security measures on the production system during an attack, in case the hacker realizes he's been duped. These low-interaction honeypots do not collect a lot of data and only emulate services frequently requested by hackers.


Research honeypots are used by universities, governments and the military to reveal the motives and tactics of the hackers. As such, they collect as much information as possible and emulate entire computers. In contrast to production honeypots, these high-interaction honeypots are difficult to maintain and set up.



Intrusion Detection and Prevention Systems offer a defensive approach to cybersec. They become useful once an attack happens. If a hacker slips past these systems, the company's infrastructure is irreversibly compromised.


In contrast, honeypots are a offensive security measure. They stop hackers before they even approach the production system and collect data to prevent them from getting any closer.



SafeHouse has all of the features of typical honeypot software.


The key difference is that we host secure, convincing honeypots on our own servers. Malicious requests to your infrastructure can be proxied to our managed honeypots.


This model eliminates the security risks and maintenance costs associated with high-interaction honeypots. With SafeHouse, companies can leverage the benefits of both low and high interaction honeypots without any downsides.


We also use synthetic data to make the honeypots as convincing as real systems.



SafeHouse is currently in the early stages of development. We do not know exactly when it will be ready for release but we suspect that there will be an alpha by Fall 2021 at the latest. Until then, we will post continual updates to our blog and social media.