Adaptive Campaigns Blog Terms - Attivo Networks

Adaptive Campaigns

American Security Today

Adaptive Deception Delivers Ops Agility to Outmaneuver Attackers

Attivo Networks, the leader in deception solutions for cybersecurity defense, and a Finalist in the 2017 ‘ASTORS’ Awards, announces it’s Adaptive Deception Campaigns, which use machine-learning to create and automate the deployment of campaigns that bolster deceptions to address the evolving threat landscape and ever-changing attack surface.

Adaptive campaigns are unique to other security controls in that they change the asymmetry of attacks with their ability to change the network “game board” automatically or on demand based on suspicion that an attack is underway.

DarkReadingLogo

Attivo Networks Announces Adaptive Deception Campaigns

Attivo Networks announced the release of its Adaptive Deception Campaigns, which use machine-learning to create and automate the deployment of campaigns that bolster deceptions to address the evolving threat landscape and ever-changing attack surface. Adaptive campaigns are unique to other security controls in that they change the asymmetry of attacks with their ability to change the network “game board” automatically or on demand based on a suspicion that an attack is underway.

Attivo Networks® Announces Adaptive Deception Campaigns Delivering Operational Agility to Outmaneuver Attackers

Attivo Networks® today announced the release of its Adaptive Deception Campaigns, which use machine-learning to create and automate the deployment of campaigns that bolster deceptions to address the evolving threat landscape and ever-changing attack surface. Adaptive campaigns are unique to other security controls in that they change the asymmetry of attacks with their ability to change the network “game board” automatically or on demand based on suspicion that an attack is underway. This new power to reset deception throughout global networks at whim, gives security teams the offensive control to force the attacker to start over, make a mistake, give up or incur increased time and costs in their attempt to breach the network.

Scroll to Top