Q5 is designed to deceive attackers, observe their behavior and adapt to
intrusion attempts. Rooted in honeypot design, the device uses virtualization
to create fully functional decoy networks that trick attackers into providing
the data needed to thwart them. Low-level data capture, signature generation
and forensic analysis occur in real time, so even zero-day attacks can be
prevented. Compatible with IDS/IPS systems from all major vendors, the product
is easily integrated with a zero footprint.