Four things to know about Deception Technology and EDR - Attivo Networks
Attivo Networks Blogs

Four things to know about Deception Technology and EDR

CISO Mag logo

Contributed by Carolyn Crandall, Chief Deception Officer, Attivo Networks

Many will advocate that the cybersecurity battle is fought at the endpoint. Completely secure these devices and the attacker will not be able to advance their attack. This belief has fueled a new interest and focus on moving from endpoint protection (EPP) to endpoint detection and response solutions (EDR) as well as managed detection and response (MDR) solutions.

The threat landscape is rapidly changing, and organizations’ defenses need to change with it. The latest generation of sophisticated attackers have proven that they can evade anti-virus solutions and bypass traditional perimeter defenses. Given their ability to routinely compromise networks, it has become more important than ever to layer in a “Defense in Depth” strategy that includes prevention, detection, and response. In many cases, predictive measures are also becoming a factor, increasing the need for collection of threat intelligence, which may have been discarded with prior prevention-only approaches.

Unlike endpoint protection solutions, EDR is more than a single product or simple set of tools. The term covers a range of capabilities that combines monitoring, analysis, reporting, response, and forensic functions into a suite of defenses designed to respond to highly skilled attackers. By placing sensors and response capability on the endpoints, these systems are positioned to identify and stop an attacker while the attack is in play. The forensic capabilities in many EDR solutions also facilitate the ability to capture threat intelligence and to analyze an attack for identifying weaknesses in their existing defenses.

Despite the many enrichments found in EDR, a full Defense-in-Depth strategy requires more. EDR solutions from major providers such as Carbon Black, Cisco, CrowdStrike, Cybereason, FireEye, Symantec, Tanium, and others still have gaps related to the detection of in-network threats, discovery and inventory of endpoint assets, information sharing amongst security controls, and processes to minimize response times. Complementary technologies can close many of these gaps.

The deployment of deception technology as a complimentary technology alongside an EDR platform can play a significant role in closing these exposures. Most people will identify with deception as an efficient means for early and accurate detection of threats and for its role in reducing attacker dwell time. However, with advanced distributed deception platforms (DDPs), organizations can also gain visibility, asset discovery, and information sharing automations.

The following are four areas in which deception technology adds significant value when deployed with EDR platforms for Defense-in-Depth, or what Gartner, Inc. refers to as an “Adaptive Defense.”

In-network Detection and Visibility

Deception Technology enhances EDR defenses by quickly detecting threats that are moving laterally within the network, credential theft, and other forms of sophisticated attacks like man-in-the-middle compromises. By creating a synthetic attack surface based on skillfully crafted decoys designed to mirror production assets, organizations create an environment where an attacker is unable to differentiate between deception and real devices. This not only redirects them away from legitimate targets, but also proactively lures and entices them into engaging with the deception environment that will raise a real-time alert of their presence.

Detection strategies include placing breadcrumbs on the endpoints in the form of fake credentials, file shares, mimicked services, and decoy data that can quickly lure attackers into the deception environment where their actions can be recorded and studied without their knowledge.

Discovery and Tracking of Endpoints

To prepare, deploy, and operate deceptions, modern-day DDPs use machine self-learning to understand new devices coming on and off the network, along with their profiles and attributes. Originally designed for creating authenticity, this information also provides security teams with powerful knowledge of adds and changes to the network. This has proven invaluable for detecting unauthorized personal devices, IoT, and other less-secure devices being placed on the network, or devices added with malicious intent. In addition to device visibility, platforms also come with the ability to alert on exposed credential attack paths. Exposed and orphaned credentials, along with system misconfigurations, are often the opening needed for an attacker to gain a foothold. The insight provided in topographical maps not only reduces risk but eliminates hours of manual processing work.

Read More>>>

Share on:

Free Active Directory Assessment

Get Visibility Into Privilege And Service Account Exposure

For a limited time, Attivo Networks is providing free Active Directory Security Assessments to demonstrate how ADAssessor provides unprecedented and continuous visibility to AD vulnerabilities.

Try Our Endpoint Detection Net (EDN) for Free

FAST AND EASY

Free use offer of our Award-winning security solution to prevent attackers from lateral movement, credential theft, and privilege escalation, fast and easy.

Newsletter Signup

    Yes, please opt me in to receive your quarterly newsletter, event invitations, and product updates.

    I understand that I can opt out at any time, and can refer to Attivo Networks Privacy Policy for more information.
  • This field is for validation purposes and should be left unchanged.

ADSecure 90-Day Free Trial

GET PROTECTION AGAINST UNAUTHORIZED ACCESS TO ACTIVE DIRECTORY

  • Hide and deny access to AD objects
  • Get alerted on unauthorized queries
  • Attack details easily viewable in dashboard
  • Your data remains on-premise

RSS

Leave a Comment

Your email address will not be published. Required fields are marked *

eighteen + nine =

Ready to find out what’s lurking in your network?

Scroll to Top