Attivo Network Blog Terms - Page 2 of 2 - Attivo Networks

Attivo Network

Incident Response (IR) Washington DC

IR19 is a conference for cybersecurity professionals to learn and develop playbooks to improve Incident Response processes. 30+ hours of practical training on today’s best practices in incident response topics 36 breakout sessions designed for all levels of experience Learn practical operations tips and best practices from industry leaders Leave the conference with a developed …

Incident Response (IR) Washington DC Read More »

InfoSec Healthcare Connect

InfoSec Healthcare Connect is a forum where senior cybersecurity executives from some of the top US healthcare facilities come together to have detailed discussions with their peers, source solutions and services from leading providers, and gain valuable insights on how to improve their cybersecurity and elevate their current information security programs and policies. InfoSec Healthcare …

InfoSec Healthcare Connect Read More »

Tushar Kothari—Chief Executive Officer

Attivo Networks® CEO Recognized in Finance Monthly CEO Awards 2019

Tushar Kothari selected as winner for outstanding leadership and executive achievements Attivo Networks®, the award-winning leader in deception for cybersecurity threat detection, today congratulates CEO Tushar Kothari as a winner in Finance Monthly CEO 2019 Awards. The award honors outstanding C-level executives who pave the way to success in highly respected global companies across a …

Attivo Networks® CEO Recognized in Finance Monthly CEO Awards 2019 Read More »

Attivo Networks Named a 2017 Red Herring Top 100 Company in North America

FREMONT, CA – June 19, 2017 – Attivo Networks® announced today that it was selected as a winner of the 2017 Red Herring Top 100 companies in North America, one of the technology industry’s most prestigious recognitions.

“It is an honor to be recognized as a Top 100 Red Herring winner,” said Attivo Networks CEO Tushar Kothari. “This recognition is yet another validation to the innovation and rapid adoption of deception technology. Cyber-attacks continue to increase in their complexity and intensity, repeatedly demonstrating that they can and will penetrate perimeter defenses. Now more than ever, companies need an efficient and reliable approach for quickly revealing in-network threats. Deception provides not only this, but also uniquely, slows down the attacker, providing organizations the time advantage needed to derail attacks.”

Scroll to Top