Attivo Networks has added a model to its BOTsink family for network-based threat detection. Attivo’s BOTsink servers are designed to provide security officers with the ability to identify, analyze and combat network-based attacks. They complement Attivo’s EDN (Endpoint Detection Net) suite to combat attacks based on access data. Read the product news in LANline.
Attivo Networks®, an award-winning leader in cyber deception and attacker lateral movement threat detection, today announced it will host a webinar titled, “Mapping your Active Defense Capabilities to MITRE Shield.” Webinar hosts will be Tushar Kothari, chief executive officer of Attivo Networks and Edward Amoroso, chief executive officer of TAG Cyber. They will have a …
New Report Identifies Financial Savings and Increased Productivity Based on Early Detection and Response Efficiency Attivo Networks®, an award-winning leader in cyber deception and attacker lateral movement threat detection, today announced the results of a new research report conducted with Kevin Fiscus of Deceptive Defense, Inc., “Cyber Deception Reduces Breach Costs & Increases SOC Efficiency.” …
Written by: Carolyn Crandall, Chief Deception Officer – Over the past five years, the conversation around cyber deception has advanced from the question of what it is to what to use it for. Fundamentally, cyber deception has evolved into a highly regarded threat detection solution for companies of all sizes and security maturity levels. This blog outlines how the capabilities of deception technology have expanded and the various roles it can play within the security stack. This particular article aligns with the steps a responder will take in preparing for and responding to an attack.
Every device that connects to a network creates a security risk. There are many forms of defenses designed to protect these endpoints including anti-virus, firewalls, HIPS, endpoint detection and response (EDR), and other forms of access control. Most of these solutions require installed agents to manage authorizations and authentication, track device activities, and detect and remove viruses and malware. Despite the efforts applied to endpoint protection and EDR solutions, it is inherently insufficient. Even if you could find every endpoint, manage every agent, and keep every device consistently patched, there are fundamentally too many attack vectors to keep up with.
Join us to learn how the Attivo Networks in-network deception technology can strengthen your existing Security Orchestration, Automation, and Response (SOAR) solution. SOAR addresses the issues that SOCs regularly deal with, such as the volume of alerts and a lack of experienced security personnel. The Attivo Networks ThreatDefend platform can help security teams address challenges …
Written by: Mike Parkin – Product Marketing Engineer – I recently caught a webinar presented by ObserveIT that addressed the challenges presented by “insider threats.” They did a good job of defining the term, the threats, and they laid out some broad-stroke suggestions on how to address the problem. Something they didn’t talk about, was how deception technology is a powerful tool for dealing with this difficult problem.
Authored by: Carolyn Crandall, The new year is upon us, and the need for comprehensive cybersecurity is as strong as ever. As threats that continue to evolve and expand, it is critical that organizations prepare for the future with a plan to address the most vulnerable aspects of their threat detection and response strategies. Breaches are already making headlines in 2019, and organizations are increasingly looking for ways to shift the balance of power away from the attacker.
Tony Cole is the Chief Technology Officer at Attivo Networks and is a cybersecurity expert with more than 30 years’ experience, a bachelor’s degree in computer networking and is a CISSP. Tony discusses cyber deception in the enterprise today and gives a brief history of deception and it’s applicability to cybersecurity.