AWS Blog Terms - Attivo Networks

AWS

DarkReadingLogo

Attivo Networks Tackles Cloud Threat Detection Gaps

Expands ThreatDefend Cloud Data Center offerings for Azure, AWS, and OpenStack.

Fremont, CA – Attivo Networks announced that it has expanded its ThreatDefend Deception and Response Platform cloud data center detection support to include Azure deployment capability in addition to existing support for Amazon Web Services (AWS) and OpenStack. Additionally, the company announced its ThreatDirect solution, which is designed for remote and branch offices (ROBOs) and can be used for microsegmented networks. The technology removes the need for a local BOTsink deception server, reducing cost and eliminating the necessity for skilled local resources.

More Deception in the Cloud Makes Detection Less Cloudy

By: Carolyn Crandall This week, Attivo Networks® announced the release of an enhanced version of the ThreatDefend™ Deception and Response Platform that includes cloud data center detection support for Microsoft® Azure. This capability builds on the existing ThreatDefend support for Amazon Web Services (AWS) and OpenStack®.

The door is now open and the detection outlook is clearer for Azure users that adopt deception-based detection technology through the use of the Attivo ThreatDefend platform. Azure is rapidly gaining adoption as evidenced in Microsoft’s fiscal year 2017 Q4 report, where it cited 97 percent year-over-year revenue growth for Azure, and industry analysts remain confident the Azure user base will continue to increase at a torrid pace.

Attivo Networks News

Attivo Networks® Tackles Cloud Threat Detection Gaps

Attivo Networks® today announced that it has expanded its ThreatDefend™ Deception and Response Platform cloud data center detection support to include Azure deployment capability in addition to existing support for Amazon Web Services (AWS) and OpenStack. Additionally, the company announced its ThreatDirect™ solution, which is designed for remote and branch offices (ROBOs) and can be used for microsegmented networks. The technology removes the need for a local BOTsink™ deception server, reducing cost and eliminating the necessity for skilled local resources. These solutions are specifically designed to address the growing challenges associated with lateral movement threat detection within cloud data centers and the often inconsistent security controls within ROBO environments.

A(head) in the Cloud(s) – Attivo Named Cloud Security Startup of the Year

By: Carolyn Crandall The worldwide public cloud services market is estimated to reach $122.5B in 2017, an increase of 24.4% from 2016 according to a recent IDC report. Companies are rapidly shifting to cloud-based services because of their outstanding convenience and scalability. However, on top of “traditional” cybersecurity threats that plague on-premises systems and devices, the cloud is susceptible to a new set of threats unique to cloud environments that inherently endanger organizations’ networks.

Hole in the Cloud Service Bucket: Dow Jones Data Exposed

User Error Blamed; Follows Similar Mishaps at Verizon, WWE, Scottrade

Is there a hole in your Amazon Web Services bucket?

Many organizations now rely on these cloud-based buckets, or virtual containers, to store and share data. By default, AWS Simple Storage Service, or S3, containers are not publicly accessible, and access can be tightly restricted. But many organizations inadvertently misconfigure their buckets to allow “public” or semi-public access, which can result in data being exposed.

Oops, They Did it Again

Last week Dow Jones, the business and financial news company that owns the Wall Street Journal, admitted that 2.2 million customers’ details were exposed due to an Amazon S3 bucket misconfiguration. They are not alone and follow similar mishaps reported by Verizon, World Wrestling Entertainment, and Scottrade. They all share a common root problem, user error that resulted in exposing the contents of their S3 buckets. There are now over one million authenticated AWS users and S3 misconfigurations are becoming all too common.

Limits of Amazon Web Services Security Controls and the Need for Deception Technology

Amazon Web Services (AWS) offers a range of robust security controls but relying solely on AWS to ensure information security is a mistake. Amazon makes clear that public clouds entail a shared security model. Amazon will manage physical security, implement network security, lock down hypervisors, and provide tools, such as identity management services and virtual private clouds, for customers to use as needed. Customers, in turn, are responsible for implementing access control policies, monitoring systems, and assessing applications for vulnerabilities.

Scroll to Top