CSO Blog Terms - Attivo Networks

CSO

CSO50 – POSTPONED

THE CSO50 CONFERENCE LEVERAGING WORLD-CLASS SECURITY STRATEGIES Sessions at the CSO50 Conference will explore how the business risk landscape is changing at breakneck speed, and the ways enterprise technology rapidly advances and exposes new threats, the number of Internet-of-Things (IoT) and other devices is growing exponentially and by the billions. Attend and discover how you …

CSO50 – POSTPONED Read More »

Attivo Networks® Chief Deception Officer Carolyn Crandall Takes the Stage at CSO50

Attivo Networks, the award-winning leader in deception for cybersecurity threat detection, today announced that Carolyn Crandall, Chief Deception Officer, is presenting at this year’s CSO50 Conference. Her session, “Deception Technology: A Look Under the Hood,” will go beyond deception’s role for in-network threat detection to uncover the value of the technology in identifying, investigating, and responding to attacks – and in reducing risk.

Hottest new cybersecurity products at RSA 2019

This year’s RSA Conference is a key venue for companies to showcase their new cybersecurity products. Here are some of the more interesting tools to check out. The Informer is a deception-based, real time forensic collection offering that extends Attivo’s ThreatDefend Detection and Response platform. The new tool provides a view of the attacker’s activity to accelerate intelligence-driven response and remediation, enhancing the ability to rapidly gather, understand and disseminate adversary intelligence. RSAC Location: South Expo 455

CSO logo

Security software reviews: How cutting-edge products fare against the latest threats

We go hands-on with some of the most innovative, useful and, arguably, best security tools from today’s most important cybersecurity technology categories.

Attivo addresses the one main weakness of most deception technology, having to rely on other programs to respond to an attack once revealed by the deception network. The Attivo platform offers quick response capabilities and the ability to interact with third-party programs for additional backup, configured using an intuitive drag and drop interface that requires very little training. After that, things like internal sandboxing and phishing e-mail protection are just icing on the cake of an already very impressive product.

Top security tools, 2017: How cutting-edge products fare against the latest threats

We go hands-on with some of the most innovative, useful and, arguably, best security tools from today’s most important cybersecurity technology categories.

Threats are constantly evolving and, just like everything else, tend to follow certain trends. Whenever a new type of threat is especially successful or profitable, many others of the same type will inevitably follow. The best defenses need to mirror those trends so users get the most robust protection against the newest wave of threats. Along those lines, Gartner has identified the most important categories in cybersecurity technology for the immediate future.

Attivo Networks adds response capabilities to deception deployments

With its Deception and Response Platform, Attivo Networks addresses the main weakness of most deception technology, having to rely on other programs to respond to an attack once revealed by the deception network.Deception technology, deploying fake assets inside real networks to trick and catch attackers, shows an incredible amount of promise within cybersecurity as the technology grows. Even as hackers learn to expect that deception assets will be hidden among their targets, deception tools seem more than capable of keeping one step ahead. So long as the deceptive assets are supported with lures and breadcrumbs on production systems to make them look real, attackers will inevitably wander into the traps and reveal themselves.

Scroll to Top