cloud Blog Terms - Page 3 of 5 - Attivo Networks

cloud

Attivo Networks baits IoT attackers

Attivo Networks integrates its ThreatDefend platform into Microsoft IoT Edge … Attivo Networks has integrated its Deception technology-based ThreatDefend platform into the Microsoft Azure Security Center. This further improves the detection rate and response time when attacking the Microsoft Azure IoT Edge service. Because Intelligent Edge is a common target for attackers, the Azure IoT …

Attivo Networks baits IoT attackers Read More »

Attivo Networks bolsters Google Cloud’s Managed Service for Microsoft Active Directory

Attivo Networks has opened up its ADSecure solution for use with Google Cloud’s Managed Service for Microsoft Active Directory (AD). … Active Directory is a common tool to help businesses organise their users, services, and computers. However because it is a centralised directory that can help people understand networks and gain privileges, it’s a popular …

Attivo Networks bolsters Google Cloud’s Managed Service for Microsoft Active Directory Read More »

Attivo Networks® Enhances AD Security for Google Cloud’s Managed Service for Active Directory with Deception and Misdirection Capabilities

Together, ADSecure and Google Cloud’s Managed Service for Active Directory Help Prevent Attackers from Gaining Access to Critical Cloud-Based AD Information … Attivo Networks®, the award-winning leader in deception for cybersecurity threat detection, today announced the availability of its ADSecure solution for Google Cloud’s Managed Service for Microsoft Active Directory (AD). The Google Cloud team …

Attivo Networks® Enhances AD Security for Google Cloud’s Managed Service for Active Directory with Deception and Misdirection Capabilities Read More »

Attivo Networks® Honored with Five 2020 InfoSec Awards from Cyber Defense Magazine

FREMONT, Calif.–(BUSINESS WIRE)–Attivo Networks®, the award-winning leader in deception for cybersecurity threat detection, today announced that it was honored with five InfoSec Awards from Cyber Defense Magazine during the RSA Conference 2020 in San Francisco. The Attivo Networks ThreatDefend® Detection Platform was recognized as “Best Product in Cloud Security,” “Cutting Edge Endpoint Security,” “Most Innovative Deception-Based Security,” and “Next Gen Insider Threat Detection.” Additionally, the company was named a “Hot Company in Critical Infrastructure Protection.”

Healthcare 2030: Smart, Connected and in the Cloud

The healthcare industry has been slow to adopt digital-first practices. While other industries are filing records in the cloud and hosting meetings over videoconference, care providers are still using file cabinets and doing follow-ups in person.

That attitude is changing quickly, however. We are on the cusp of an Internet of Things-powered revolution that has the potential to transform healthcare.

A healthcare sector driven by an Internet of Medical Things is on the horizon. Connected medical devices, big data and the cloud are becoming crucial tools to improve care, fight diseases and overcome the challenges facing healthcare.

Multi-Cloud Threat Detection Innovations Drive Cyber Deception Growth

FREMONT, Calif.–(BUSINESS WIRE)–Attivo Networks®, the award-winning leader in deception for cybersecurity threat detection, today announced significant market momentum for its cloud deception capabilities as new attack surfaces and security vulnerabilities continue to emerge within cloud-native or hybrid environments. Additionally, Cyber Defense Magazine recently named the Attivo ThreatDefend® Platform a ‘Best Product’ for cloud security based on its ability to detect reconnaissance and lateral movement quickly, misdirect attacks, and generate engagement-based alerts on threats inside multi-cloud and serverless environments.

Deception to Secure Amazon S3 Buckets

Written by: Joseph Salazar, Technical Deception Engineer – Amazon Simple Storage Service (S3) provides the ability to store and serve static content from Amazon’s cloud. Businesses use S3 to store server backups, company documents, weblogs, and publicly visible content such as web site images and PDF downloads. Users organize files within S3 into “buckets,” which get assigned a URL based on a standard, predictable pattern for access to them.

predictions

Cybersecurity Predictions for the Second Half of 2019

Authored by: Carolyn Crandall, Chief Deception Officer – At the beginning of the year, I spent some time looking ahead at what the future might hold for the cybersecurity community, and I suggested a few resolutions that might help forward-thinking organizations improve their defense against future cyberattacks. Now that we’re over the halfway mark of 2019, it feels like the perfect time to make some predictions for the remainder of the year—and beyond—and discuss how we can be proactive about it.

Cloud Configurations Continue to Pose Data Center Security Challenges

According to an Attivo survey of security professionals conducted late last year, the cloud attack surface was the single greatest threat to enterprises. And a survey released earlier this year by Kansas-based security vendor Firemon revealed that 60% of those surveyed said their cloud deployments have accelerated past their ability to secure them.

Scroll to Top