The Cyber Intelligence Network gives us a view of where attacks are emanating from, where they are targeted and what they are trying to attack; ports, OS, Applications, protocols etc. Each honey pot is build with a different profile. Some of our honey pots are designed specifically to mimic hosts of our clients in order that we can forewarn about attacks against those parameters. We are able to monitor and watch attacks as they happen so we can analyse the source, type and source host.