Trusted by Security Teams Worldwide

High-Confidence Breach Detection — Without Hardware

Drop invisible tripwires across your infrastructure. Canary tokens in documents, VM agents on servers, honeypots in cloud storage. Know the moment an attacker touches your data - before they know you're watching.

No credit card required Air-gap compatible SOC 2 ready

$ signal-canary deploy --type vm-agent
Generating Linux agent... done
Embedding canary tokens... done
Download: signal-canary-agent-v2.4.ova (148 MB)
$ signal-canary monitor
Listening for canary activations...
ALERT: Honeypot accessed from 203.0.113.42
Organization: Acme Corp (ASN 12345)
File: /share/credentials/aws-keys.txt
Unlimited
Canaries on All Plans
7 Years
Evidence Retention
No
Hardware Required
$0
To Get Started

The Only Self-Serve VM Agent Builder

Generate and download custom Linux, Windows, or container agents in minutes. Deploy to cloud, on-prem, or air-gapped environments. No hardware to buy, no consultants to hire. Just download, deploy, and detect.

Build Your First Agent

Enterprise-Grade Breach Detection

Multiple layers of invisible protection - from documents to infrastructure

Canary Tokens

Fake AWS keys, database credentials, API tokens. Plant them anywhere. Know instantly when attackers test stolen secrets.

Honeypot Documents

Word, Excel, PDF with invisible tracking. "Confidential_Salaries.xlsx" triggers alerts when opened by unauthorized users.

VM Agents

Deploy sensor VMs that monitor file access, network traffic, and credential usage. Works in air-gapped environments.

Organization Attribution

Know WHO accessed your canaries. IP-to-company resolution with confidence scoring. Track corporate espionage, not bots.

Real-Time Alerts

Slack, email, webhooks, or SIEM integration. Full forensics: IP, geo, device, ASN. Playbook automation for IR teams.

Air-Gap Mode

For classified environments. Agents log locally, encrypted export via USB. No internet required. FIPS-ready.

Deploy Anywhere

Download ready-to-run agents for any environment

Linux

OVA, ISO, or Docker

Windows

MSI installer

Docker

Container image

Kubernetes

Helm chart

Air-Gap

Offline mode

Built for Security Teams

From SOC analysts to incident responders

Insider Threat Detection

Plant honeypot files in HR shares. Know instantly when employees access files they shouldn't.

Credential Theft Detection

Canary AWS keys in repos, fake passwords in config files. Catch attackers testing stolen creds.

Lateral Movement Detection

VM agents on decoy servers. Attackers who pivot to your honeypot expose themselves.

Data Exfiltration Monitoring

Track sensitive documents. Know when they're opened outside your network.

Compliance & Audit

Immutable audit logs, chain-of-custody reports. Evidence-grade forensics for legal proceedings.

Red Team / Purple Team

Validate detection coverage. Test if your SOC catches canary activations during exercises.

Security Evidence, Not Just Alerts

When a canary triggers, you need more than a notification. You need defensible evidence for incident response, compliance audits, and legal proceedings.

What We Retain

Every canary interaction: timestamps, source IP, user agent, device fingerprint, ASN/organization attribution, deployment context, and cryptographic validation records.

Why Retention Matters

Incident response investigations can span months. Compliance audits require historical proof. Legal proceedings demand chain of custody. Your evidence must outlast your investigation.

Cryptographic Chain of Custody

Every event is cryptographically signed at capture. Tamper-evident logs with offline verification. Evidence that stands up to scrutiny.

Evidence Retention by Tier
Sentinel (Free)
30d
Team
1 year
Enterprise
3 years
Enterprise Plus

SEC/FINRA requires 7-year retention. HIPAA requires 6 years. PCI-DSS requires 1 year minimum.

Simple, Annual Pricing

All plans include unlimited canaries. Pricing is based on evidence retention and investigation readiness — not arbitrary usage limits.

Our philosophy: Canary tokens are high-confidence security events. We don't charge per-alert, per-canary-type, or per-seat. We charge for the assurance level your investigations and compliance requirements demand.

Evaluation

Sentinel

$0/year

For security practitioners

30-day evidence retention
  • Unlimited canaries (all types)
  • Email alerts
  • JSON exports
  • API access
  • 1 environment
  • No VM Forge
Start Free
SMB

Team

$5,000/year

For growing security teams

1-year evidence retention
  • Unlimited canaries (all types)
  • 2 VM Forge appliances
  • Email + Webhook alerts
  • PDF + CSV exports
  • Organization attribution
  • 3 environments
  • Audit logs
Join Beta

SOC 2 / ISO 27001 ready

Critical Infrastructure

Enterprise Plus

$35,000+/year

For maximum assurance

7-year evidence retention
  • Unlimited everything
  • Air-gapped deployments
  • Legal hold capability
  • White-label options
  • Unlimited environments
  • SCIM provisioning
  • 4-hour SLA support
  • Quarterly reviews
Contact Sales

SEC/FINRA 7-year compliant

How We Compare

Unlike hardware-centric solutions, Signal Canary provides cryptographic evidence chains and regulatory-grade retention out of the box. No appliances to ship, no consultants to hire. Deploy in minutes, investigate with confidence for years.

MSSPs: Multi-tenant partner pricing available. Contact our partner team.

Private Beta

Join the Beta

We're looking for security professionals to help test Signal Canary before public launch. Sign up below and we'll be in touch soon.

Catch Breaches Before They Become Headlines

Be among the first to deploy enterprise-grade canary detection.

Join the Beta