Attivo Networks Integrates Deception Technology with Juniper Networks SRX Series Firewall - Attivo Networks
Attivo Networks Blogs

Attivo Networks Integrates Deception Technology with Juniper Networks SRX Series Firewall

[vc_row parallax=”” parallax_image=”” row_type=”row” type=”full_width” anchor=”” in_content_menu=”” content_menu_title=”” content_menu_icon=”” text_align=”left” video=”” video_overlay=”” video_overlay_image=”” video_webm=”” video_mp4=”” video_ogv=”” video_image=”” background_image=”” section_height=”” background_color=”” border_color=”” padding=”” padding_top=”” padding_bottom=”” more_button_label=”” less_button_label=”” button_position=”” color=”” css_animation=”” transition_delay=””][vc_column width=”1/1″][vc_column_text]

I am pleased to share that today Attivo Networks® announced that its deception-based Attivo BOTsink® solution works as an integrated solution with the Juniper Networks® SRX Series security portfolio. With this integration, the BOTsink solution now works seamlessly with Juniper Networks’ Junos® Space Security Director and the Juniper Networks Spotlight Secure Threat Intelligence Platform to provide the SRX Series Services Gateways next generation firewalls the needed intelligence to block infected nodes from gaining Internet access and exfiltrating valuable company data.

How it works:

The Attivo deception platform creates a matrix of traps across networks, data centers, and clouds to detect cyber threats that have bypassed prevention systems and are propagating within the network. The BOTsink engagement server then uses dynamic deception techniques to lure attackers in and away from company servers that contain valuable assets. Once the attacker engages, attack forensics are captured and through the integration, are updated into the Juniper SRX Firewall so that the infected node is quarantined for remediation.

Value to joint customers:

Attivo Networks provides a complimentary line of defense to perimeter security solutions and detects cyber attacks that have by-pass all other security prevention solutions. Attivo dynamic deception provides the detection and visibility into BOTs and APTs that are in the network and through integration, the BOTsink solution will update the Juniper Networks SRX Series Firewalls to quarantine infected nodes dramatically reducing the time required for detection, quarantining, and remediation.

Joint customer business benefit: 


Attivo Networks and Juniper Networks joint business benefit is a defense in depth solution that combines the benefits of both prevention and detection. Customers will have best in class prevention from the Juniper SRX Firewall and detection of signature-less, stolen credential and insider attacks that have bypassed prevention systems. In real-time the Attivo BOTsink solution can detect the attacker, capture forensics, and provide the Juniper SRX firewall the required information to quarantine an infected end point preventing a cyber attacker from completing their mission.

Additional Resources:

 

Author:

Carolyn Crandall
Chief Marketing Officer
Attivo Networks

[/vc_column_text][/vc_column][/vc_row]

Share on:

Free Active Directory Assessment

Get Visibility Into Privilege And Service Account Exposure

For a limited time, Attivo Networks is providing free Active Directory Security Assessments to demonstrate how ADAssessor provides unprecedented and continuous visibility to AD vulnerabilities.

Try Our Endpoint Detection Net (EDN) for Free

FAST AND EASY

Free use offer of our Award-winning security solution to prevent attackers from lateral movement, credential theft, and privilege escalation, fast and easy.

Newsletter Signup

    Yes, please opt me in to receive your quarterly newsletter, event invitations, and product updates.

    I understand that I can opt out at any time, and can refer to Attivo Networks Privacy Policy for more information.
  • This field is for validation purposes and should be left unchanged.

ADSecure 90-Day Free Trial

GET PROTECTION AGAINST UNAUTHORIZED ACCESS TO ACTIVE DIRECTORY

  • Hide and deny access to AD objects
  • Get alerted on unauthorized queries
  • Attack details easily viewable in dashboard
  • Your data remains on-premise

RSS

Leave a Comment

Your email address will not be published. Required fields are marked *

seven + twenty =

Ready to find out what’s lurking in your network?

Scroll to Top