Attivo Networks Blogs

Deception Security Provider Attivo Now Has AWS Deployment

Attivo’s BOTsink uses deception to detect threats within all network and data center environments–on premises or in the AWS cloud.

Attivo Networks, which uses a “lure-the-bad-guys-in-and-trap-them” approach to securing IT networks, has always provided an on-premises, loaded-on-a-server product. Now it is scaling globally, thanks to new support of Amazon Web Services.

The Fremont, Calif.-based company on Sept. 2 launched what it calls “the industry’s first globally scalable deception technology solution” that detects inside-the-network threats across an enterprise and private and public clouds. It will do this first on the AWS cloud, by far the world’s largest cloud-service provider; deployment connections to other clouds are in the works.

Attivo’s BOTsink platform aims to detect threats within all network and data center environments. The new Attivo Central Manager within the platform provides a universal control console and centralization of threat intelligence for its global BOTsink deployments, the company said.

Read More>>

Share on:

Free Active Directory Assessment

Get Visibility Into Privilege And Service Account Exposure

For a limited time, Attivo Networks is providing free Active Directory Security Assessments to demonstrate how ADAssessor provides unprecedented and continuous visibility to AD vulnerabilities.

Try Our Endpoint Detection Net (EDN) for Free


Free use offer of our Award-winning security solution to prevent attackers from lateral movement, credential theft, and privilege escalation, fast and easy.

Newsletter Signup

    Yes, please opt me in to receive your quarterly newsletter, event invitations, and product updates.

    I understand that I can opt out at any time, and can refer to Attivo Networks Privacy Policy for more information.
  • This field is for validation purposes and should be left unchanged.

ADSecure 90-Day Free Trial


  • Hide and deny access to AD objects
  • Get alerted on unauthorized queries
  • Attack details easily viewable in dashboard
  • Your data remains on-premise


Leave a Comment

Your email address will not be published.

5 × one =

Ready to find out what’s lurking in your network?

Scroll to Top