Customer Testimonials
We have a tiny sales-team, but our Canaries have a pretty awesome footprint (hundreds of thousands of tokens have been minted and Canaries are running on all 7 continents). This only happens because of our awesome customers. Here's what some of them had to say about us and Canary's usefulness.
Contact usComplete list of enterprise security products I recommend (evergreen edition): 1) @ThinkstCanary 2) @duosec 3) @Yubico
I have to give a shout out to @ThinkstCanary for being awesome. They not only have a great product but also great people behind it. 🦅
Out with the old @ThinkstCanary's and in with the new. If you have not deployed these on your network you are missing a great tool.
“Thinkst Canary builds the best security product for the dollar period. Their technology has driven a paradigm shift in detection engineering. For a fraction of the cost of other security tools Thinkst has provided more insight around adversarial behavior by producing only high fidelity alerts...
“Thinkst Canary builds the best security product for the dollar period. Their technology has driven a paradigm shift in detection engineering. For a fraction of the cost of other security tools Thinkst has provided more insight around adversarial behavior by producing only high fidelity alerts. Gone are the days of trying to find a needle in a haystack full of false positives.
Canary has helped us detect and mitigate several incidents that could have turned into catastrophes. To name a few of the times where Canary really came through for us:
- An alert fired by their cloned site token allowed us to identify and force a take down of several doppelganger domains that were purchased by bad actors for the purpose of launching phishing attacks against our employees and customers
- An AWS API canary token notified us immediately of a compromised user workstation which allowed us to quickly quarantine the device before lateral movement to our production network
- An external canary device captured a wealth of threat intelligence data that we cross referenced with the Greynoise API to filter out noise and identify targeted attacks against our public facing assets
- Our third-party pentesters tripped over a Slack canary token within 20 minutes of the beginning of their engagement and subsequently triggered several others over the coming weeks that automatically built a forensic trail. This forensic data was instrumental in demonstrating our detection capabilities to our auditors and obtaining PCI compliance
I can’t recommend this product enough. You don’t know what you don’t know but Canary helps you know what you need to when it matters.”
“Over the years, there were numerous examples of Canary saving us where multi-million dollars solutions did not live up to their names, but one particular is worth mentioning because it gave us visibility into the things that are often overlooked as a risk...
“While having proper controls in place is elemental to our efforts in protecting information assets and their support infrastructure, without proper visibility those efforts might be in vain. Usually it is hard to single-out some product or tool that is a must for building and implementing proper information security management system because very nature of our work is in resilience through variety. However, over the years, Canary has earned its title of the absolutely amazing solution with incredible return of investment measuring in 100s of percentiles.
I remember when I started building from scratch information security function in large international company that had very basic security as consequence of some IT due diligence, my first investment was Canary. My own staff as well some of the top management were surprised that my first CISO decision was to deploy Canaries and my answer was simple - I need visibility before I decide where and how to start.
Over the years, there were numerous examples of Canary saving us where multi-million dollars solutions did not live up to their names, but one particular is worth mentioning because it gave us visibility into the things that are often overlooked as a risk - what people that are authorized to test your security do with that permission? In one of the companies that fall under our security jurisdiction we deployed several Canaries in order to assure data security around top executive of that company. In the past they had damaging leaks and "corporate espionage" cases that affected the business so one of the Canaries was deployed as file server with juicy file names indicating that the content are strategic decisions for the market in which the company counts among the leaders. While the said canary has triggered couple of times on the activities of employees, the most serious alert came during penetration testing exercise where external pen-tester not realizing it is caught in deception network, went deep trying to investigate juicy topics opening and searching for similar files which fell far beyond his task of checking for vulnerabilities and NOT accessing clearly marked confidential data. If the data placed in Canary was, real it could be worth a lot of money and pen-tester in our story admitted to that after our CSOC acted fast to catch him.
There it is, one of our more unusual Canary stories but not the only one. We have seen Canary saving us on multiple occasions over the years. From "the birds" to tokens, this product is simply irreplaceable for its effectiveness, simplicity and return of investment.”