Free Plan

Detect Insider Threats Before Damage Is Done

Legitimate users never touch tripwire files. When an insider accesses a decoy document — salary data, credentials, customer lists — you get an instant alert with their IP and user agent. Zero false positives.

Why Deception Works for Insider Threats

Zero False Positives

Nobody has a legitimate reason to open a fake salary spreadsheet or credentials file. Every alert is real.

Works Against Privileged Users

System admins, database admins, C-suite — deception catches anyone who snoops where they shouldn't.

No Agent Installation

No software to install on endpoints. Just plant the document and wait. Works across any platform.

Catches Curiosity & Malice

Whether it's idle curiosity or deliberate theft, the tripwire fires the same. Intent doesn't matter — access does.

Types of Decoy Files

Salary Spreadsheets

salary-review-2026.xlsx, bonus-structure.xlsx — files nobody can resist opening.

Credentials Documents

admin-passwords.docx, api-keys.txt — irresistible to anyone with malicious intent.

Customer Databases

client-list.csv, customer-export.xlsx — detect data theft before it leaves.

Config Files

production.env, database.yml — planted in repos and shared drives.

API Key Files

stripe-keys.json, aws-credentials.csv — catch credential harvesting.

Internal Memos

board-minutes-2026.docx, restructuring-plan.pdf — detect executive-level snooping.

Deployment Strategy

Where to plant for maximum coverage.

Shared Network Drives

The most common place insiders browse. Plant salary and credentials files in department shares.

Internal Wikis

Documentation sites and wikis are prime targets. Embed tripwire links in sensitive-looking pages.

Code Repositories

Drop .env files, config templates, or credential files into repos that insiders might clone or browse.

Cloud Storage

S3 buckets, GCS, Azure Blob — plant decoy files alongside real data for maximum believability.

Database Backups

Backup directories are gold mines for insiders. Plant tripwire SQL dumps and export files.

HR & Finance Folders

Restricted folders that only authorised personnel should access. Perfect for catching privilege abuse.

Alert Workflow

What happens when a tripwire is triggered.

Instant Notification

Email, Slack, or webhook — your choice. Get alerted the moment a tripwire fires.

Full Forensic Data

IP address, user agent, referrer URL, exact timing — everything you need to investigate.

Investigation Dashboard

See all trips in one place with filtering and search. Track patterns across time.

Incident Response Integration

Feed alerts into your existing IR process via webhooks, email, or Slack integration.

Alert: Insider File Access Detected
Document Name
salary-review-2026.xlsx
Time
2026-03-22 09:41:17 UTC
Source IP
10.0.14.203
Department
Engineering
User Agent
Mozilla/5.0 Chrome/120.0.0.0 (Windows NT 10.0; Win64; x64)
Access Method
Direct file open

How It Works

1

Create Decoy Documents

Choose from templates or upload custom files. Name them something irresistible — salary data, admin passwords, client lists.

2

Plant Strategically

Place tripwire documents on shared drives, in repos, on internal sites — anywhere an insider might browse.

3

Get Instant Alerts

Know who accessed what, when, and from where. Full forensic details delivered to your inbox or Slack.

Catch Insider Threats Today

Document tripwires are free on all plans. Start planting decoy files in minutes.