credential theft Blog Terms - Attivo Networks

credential theft

Visibility and Invisibility of Credential Protection: Frank Ohlhorst and Attivo Networks Unpack the How and Why

FREMONT, Calif. – October 13, 2021 – Attivo Networks®, the experts in preventing identity privilege escalation and detecting lateral movement attacks, today announced it will host a webinar titled: “Visibility and Invisibility of Credential Protection.” Frank Ohlhorst, tech industry journalist and principal analyst for emerging and disruptive technologies and at Media Ops, and Carolyn Crandall, chief …

Visibility and Invisibility of Credential Protection: Frank Ohlhorst and Attivo Networks Unpack the How and Why Read More »

The SolarWinds Attack: How to Address Lateral Movement On-Demand Webinar

Joseph Salazar, Technical Marketing Manager | Attivo Networks 22 mins The SolarWinds supply chain breach garnered much attention and concern, especially for potentially vulnerable organizations. While the compromise method was novel, analysis indicates that the attackers used typical in-network attack activities, such as credential theft, privilege escalation, discovery, and lateral movement. To defend against such …

The SolarWinds Attack: How to Address Lateral Movement On-Demand Webinar Read More »

Attivo Networks and SentinelOne Integration Delivers Protection Against Credential-Based Attacks

We are proud to announce that Attivo Networks and SentinelOne are now working together to disrupt attacks from modern adversaries. By combining the two companies’ solutions, joint customers gain the ability to prevent endpoint compromises and disrupt an attacker’s attempts to gather credentials and perform reconnaissance activities that are needed for lateral movement. Additionally, Attivo Networks has joined the SentinelOne Singularity Partner Program, which creates a collaboration model for the two companies to work together to sell and support customers.

It wire logo

Attivo ThreatPath helps reduce credential exposures

Attivo Networks has updated its ThreatPath credential exposure tool to identify and remediate high-risk exposures based on identities with excess privileges, application data sources, at-risk practices such as local admin credentials stored on the endpoint, and shadow admin accounts. The idea behind ThreatPath is to help organisations get on the front foot as far as …

Attivo ThreatPath helps reduce credential exposures Read More »

Attivo Networks Enhances Portfolio for Amplified Identity Access Management Control

ThreatPath Release Addresses Proliferation of Endpoints and Credential Protection Challenges … Attivo Networks®, an award-winning leader in cyber deception and attacker lateral movement threat detection, today announced innovative enhancements to its ThreatPath® solution, part of the modular ThreatDefend® Endpoint Detection Net (EDN) family of products. ThreatPath, which continuously observes and shows credential exposures, now also …

Attivo Networks Enhances Portfolio for Amplified Identity Access Management Control Read More »

illustrates cybersecurity reports

Recent Reports Shed Light on Today’s Cybersecurity Priorities

Authored by: Carolyn Crandall, Chief Deception Officer, Attivo Networks – For those in the cybersecurity industry, the Verizon Data Breach Investigations Report (DBIR) is one of the most anticipated publications of the year. The report always includes interesting data and research, helping to shed light on some of the most important issues facing the cybersecurity industry today. The 2020 DBIR is no exception, but it is also not the only interesting report published within the past several months. FireEye Mandiant has also released its M-Trends 2020 report and its 2020 Security Effectiveness report, and—taken together rather than individually—these new reports provide real insight into the state of the industry. Below, you can find our top 10 takeaways.

Attivo Networks ambushes attackers at the endpoint

The Attivo Endpoint Detection Net product is tackling endpoint security challenges head-on by making every endpoint a decoy designed to disrupt an attacker’s ability to break out and further infiltrate the network. It does this without requiring agents on the endpoint or causing disruption to regular network operations. The Endpoint Detection Net solution elevates security …

Attivo Networks ambushes attackers at the endpoint Read More »

Scroll to Top