Active Defense Blog Terms - Attivo Networks

Active Defense

Deception Checklist: What to Look for in a Deception Technology Solution

Authored by: Carolyn Crandall, Chief Security Advocate, Attivo Networks – In today’s quickly evolving threat landscape, perimeter defenses are no longer enough to keep attackers out. Firewalls and antivirus software still play a needed role in cybersecurity, but organizations require additional tools to detect and derail attackers once they have entered the network. Unfortunately, it is impossible to prevent 100% of attacks, which means today’s organizations must assume that their network has already been breached—and defend themselves accordingly.

Webinar: A New Way to Minimize Active Directory Security Risk

Connect with Chris Roberts, Chief Security Strategist of Attivo Networks and host Sarah Ashburn of Attivo Networks to hear about the company’s new ADSecure solution, which is designed to improve security to Active Directory (AD) and reduce risk. All, without interfering with the AD production environment. Reducing Active Directories Attack Footprint… • Let’s be frank…Active …

Webinar: A New Way to Minimize Active Directory Security Risk Read More »

Webinar: Learn to SOAR with Deception Technology

Join us to learn how the Attivo Networks in-network deception technology can strengthen your existing Security Orchestration, Automation, and Response (SOAR) solution. SOAR addresses the issues that SOCs regularly deal with, such as the volume of alerts and a lack of experienced security personnel. The Attivo Networks ThreatDefend platform can help security teams address challenges …

Webinar: Learn to SOAR with Deception Technology Read More »

digital health age

How deception can combat the cybersecurity threat to medical devices

In an interview with Digital Health Age web content editor Ian Bolland, Crandall explained the issues that are affecting medical devices when it comes to cybersecurity, including being built on operating systems that were designed to be in networks that are not interconnected. While things are getting connected, the devices that are going onto networks were never designed to be secure in such a way, and the ownership of security is a contentious issue.

Attivo Networks® Receives Multiple Honors for Advanced Threat Detection Innovation in Cyber Defense Magazine’s 2019 InfoSec Awards

“As the cybersecurity industry gathers at RSA this week, we are honored to be recognized by the 2019 InfoSec Awards as a proven leader in deception solutions and in detecting advanced threats,” said Attivo Networks CEO, Tushar Kothari. “With the Attivo Networks platform, customers can deceive, direct, and divert adversaries away from critical assets while safely collecting intelligence on their activity. The power to identify advanced attackers and better understand adversaries is having a clear and direct impact in reducing time-to-detection and the time it takes to investigate and respond to attacks.”

2019_CRN-Security100_Award

Attivo Networks® Recognized on CRN’s 2019 Security 100 List

FREMONT, Calif. – February 26, 2019 – Attivo Networks® today announced today that CRN®, a brand of The Channel Company, has named Attivo Networks to its annual Security 100 list in the Network Security category. This list recognizes the coolest security vendors in each of five categories: Endpoint Security; Identity Management and Data Protection; Network Security; SIEM, Risk and Threat Intelligence; and Web, Email and Application Security.

gov-matters-url-logos

How agencies can mitigate the impact of inevitable cyber breaches

One of the Office of Management and Budget’s goals for FY19 is to standardize cybersecurity capabilities and practices across the federal government. However, deciding which of these capabilities need to be deployed is a challenge. Tony Cole, chief technology officer at Attivo Networks, says that there are multiple obstacles to maintaining continuous diagnostics and mitigation at government agencies.

the-mercury-news

Setting traps for cyber-thieves with ‘deception technology’: Carolyn Crandall

These days it’s not enough to try to keep cyber-thieves and online spies out of your company’s network — there’s a good chance they’re already in. That’s the rationale behind “deception technology,” a sector of the cybersecurity business that grew out of the reality that no matter how good a firm’s “perimeter security” may be, a global army of extremely clever, morally compromised technologists is working diligently to break it.

Scroll to Top