Website | Integrations | AI SOC Analyst | Blogs | Discord
Novus Aegis AI is an AI-driven cyber deception platform that dynamically deploys intelligent honeypots across cloud environments, captures attacker interactions, and converts them into actionable threat intelligence.
Unlike traditional static honeypots, Novus Aegis AI continuously adapts its deception strategy using threat intelligence feeds, machine learning models, and controlled LLM analysis.
Modern cybersecurity teams face several challenges :
- Alert fatigue from excessive SIEM notifications
- Increasingly sophisticated AI-driven attacks
- Limited visibility across cloud and endpoint systems
- Slow incident response and investigation workflows
Novus Aegis AI addresses these challenges by autonomous AI security agents and adaptive deception techniques.
| Capability | Dropzone AI | Novus Aegis AI |
|---|---|---|
| Autonomous alert investigations & context memory | ✔️ | ✔️ linked to live decoy sessions |
| Human-in-the-loop review | ✔️ | ✔️ explainable deception traces |
| Integrations (SIEM / EDR / Cloud) | ✔️ | ✔️ IDS/IPS policy control |
| Deception tech (honeypots / canaries) | ❌ | ✔️ LLM-powered decoys, dynamic self-healing |
| Threat actor fingerprinting (live) | ❌ | ✔️ behavior → ATT&CK → actor mapping |
| One-click isolation & network policy | ◐ partial | ✔️ built-in Isolation Controller |
| IR playbooks generated & executed | ❌ | ✔️ workspace docs + approvals |
| Shadow AI governance (prompts / agents / data) | limited | ✔️ discover → classify → guardrail → audit |
| Single pane of glass | ◐ partial | ✔️ investigations + deception + IDS/IPS + IR |
| EU AI Act / ISO 42001 readiness | limited | ✔️ policy mapping + evidence bundles |
| Time to first high-fidelity signal | varies | ✔️ often < 60 minutes |
flowchart TD
A[Collect] --> B[Alert: Mass read operations on S3 bucket]
B --> C[Comprehend Investigation]
C --> D1[Finding 1: tomb read 825 objects from docs bucket]
C --> D2[Finding 2: No permission errors detected]
C --> D3[Finding 3: Login from known IP address]
C --> D4[Finding 4: Scheduled backup ticket OP-3]
D1 --> E[Conclude]
D2 --> E
D3 --> E
D4 --> E
E --> F[Conclusion: Expected behavior from scheduled backup]
We welcome contributions from the security and AI community.
Steps :
- Fork the repository
- Create a feature branch
- Commit your changes
- Submit a pull request
This project is licensed under the MIT License. See the LICENSE file for details.