Cyber risk to industrial sectors has grown and accelerated dramatically, led by ransomware impacting industrial processes and new activity from adversaries targeting Industrial Control Systems (ICS). According to a Dragos ICS Cybersecurity 2020 report, most of its services clients had no visibility into their ICS environments and many of their customers did not monitor for …
Attivo Networks has added a model to its BOTsink family for network-based threat detection. Attivo’s BOTsink servers are designed to provide security officers with the ability to identify, analyze and combat network-based attacks. They complement Attivo’s EDN (Endpoint Detection Net) suite to combat attacks based on access data. Read the product news in LANline.
Written by: Marc Feghali, Co-Founder and VP of Product Management – Organizations have widely adopted the Attivo ThreatDefend platform to detect attackers and their in-network activity quickly. Driven by customer demand for large scale deployment support, the company has now added the BOTsink 7500 to its BOTsink family of products.
Joint Threat Detection Solution is Part of Collaborative Partnership to Respond More Effectively to Cyber Threats Today, Attivo Networks®, an award-winning leader in deception for cybersecurity threat detection, announced an integration with IBM Security Resilient, the company’s security orchestration, automation and response (SOAR) platform. This integration enables organizations to respond rapidly to detected threats by …
The Attivo BOTsink was recently reviewed by P. R. Stephenson, PhD, CISSP (ret), exclusively at Cyber Defense Magazine. … “I’ve had the opportunity to see the BOTsink through several versions and it just keeps getting better and better. There is no doubt that it is a true next generation security tool. We are in an …
The Attivo Networks ThreatDefend solution is a deception-based platform that provides early and accurate detection of in-network threats and automation to accelerate attack analysis and incident response. The platform is based on decoys, lures, application, and data deceptions that misdirect, deter, and derail threats at initial compromise or that are moving laterally within the network. The platform covers everything from legacy infrastructure to modern cloud architectures, and is simple to deploy from user networks, data centers, clouds, ROBOs, or in specialized environments based on machine self-learning deception preparation, deployment, and operations. The solution stands apart from other deception platforms in its approach to deception authenticity and in its inclusion of automated attack analysis and extensive native integrations for incident response.
Written by: Carolyn Crandall, Attivo Networks CMO – The High Performance Computing community gathers once a year for the International SuperComputing Conference. Started 30 years ago, it is the premier HPC event of the year, where the world’s leading researchers share results and applications, and debate the future of HPC, networking, storage, and analysis.
Written by: Marc Feghali, Co-founder and VP of Product Management – You have almost certainly heard about deception technology for cybersecurity, but may be wondering what it will take to implement it in your environment. It seems complex. How can you possibly deploy it in your own diverse, distributed, and complicated network? No doubt you have the battle scars attesting to the challenge of deploying new security controls on your network. So how do you proceed?
To illustrate our point on simplicity, this enterprise case study will show, even with a larger installation, that deception is exceptionally easy to prepare, deploy, and operate.Here is an example of a deployment that a current customer of ours implemented.
Attivo Networks® today announced the release of its Adaptive Deception Campaigns, which use machine-learning to create and automate the deployment of campaigns that bolster deceptions to address the evolving threat landscape and ever-changing attack surface. Adaptive campaigns are unique to other security controls in that they change the asymmetry of attacks with their ability to change the network “game board” automatically or on demand based on suspicion that an attack is underway. This new power to reset deception throughout global networks at whim, gives security teams the offensive control to force the attacker to start over, make a mistake, give up or incur increased time and costs in their attempt to breach the network.