compromise

Help Net Security Logo

Attivo Networks ThreatPath now addresses proliferation of endpoints and credential protection challenges

Attivo Networks announced innovative enhancements to its ThreatPath solution, part of the modular ThreatDefend Endpoint Detection Net (EDN) family of products. ThreatPath, which continuously observes and shows credential exposures, now also provides organizations with the ability to identify and automatically remediate high-risk exposures based on identities with excess privileges, application data sources, at-risk practices such …

Attivo Networks ThreatPath now addresses proliferation of endpoints and credential protection challenges Read More »

It wire logo

Attivo ThreatPath helps reduce credential exposures

Attivo Networks has updated its ThreatPath credential exposure tool to identify and remediate high-risk exposures based on identities with excess privileges, application data sources, at-risk practices such as local admin credentials stored on the endpoint, and shadow admin accounts. The idea behind ThreatPath is to help organisations get on the front foot as far as …

Attivo ThreatPath helps reduce credential exposures Read More »

betanews

Deception technology speeds up detection of attacks

Users of deception technology report a 12X improvement in the average number of days it takes to detect attackers operating within an enterprise network. New research for Attivo Networks carried out by Enterprise Management Associates suggests attacker dwell times can be as low as 5.5 days with deception in use compared to an average of 78 to 100 days for those not using the technology.

Scroll to Top