cyber deception Blog Terms - Attivo Networks

cyber deception

Attivo extends the BOTsink family

Attivo Networks has added a model to its BOTsink family for network-based threat detection. Attivo’s BOTsink servers are designed to provide security officers with the ability to identify, analyze and combat network-based attacks. They complement Attivo’s EDN (Endpoint Detection Net) suite to combat attacks based on access data. Read the product news in LANline.

Attivo Networks to Host Webinar on Active Defense Capabilities of MITRE Shield

Attivo Networks®, an award-winning leader in cyber deception and attacker lateral movement threat detection, today announced it will host a webinar titled, “Mapping your Active Defense Capabilities to MITRE Shield.” Webinar hosts will be Tushar Kothari, chief executive officer of Attivo Networks and Edward Amoroso, chief executive officer of TAG Cyber. They will have a …

Attivo Networks to Host Webinar on Active Defense Capabilities of MITRE Shield Read More »

Cyber Deception Reduces Data Breach Costs by Over 51% and SOC Inefficiencies by 32%

New Report Identifies Financial Savings and Increased Productivity Based on Early Detection and Response Efficiency Attivo Networks®, an award-winning leader in cyber deception and attacker lateral movement threat detection, today announced the results of a new research report conducted with Kevin Fiscus of Deceptive Defense, Inc., “Cyber Deception Reduces Breach Costs & Increases SOC Efficiency.” …

Cyber Deception Reduces Data Breach Costs by Over 51% and SOC Inefficiencies by 32% Read More »

cyber deception

Insights into Using Cyber Deception

Written by: Carolyn Crandall, Chief Deception Officer – Over the past five years, the conversation around cyber deception has advanced from the question of what it is to what to use it for. Fundamentally, cyber deception has evolved into a highly regarded threat detection solution for companies of all sizes and security maturity levels. This blog outlines how the capabilities of deception technology have expanded and the various roles it can play within the security stack. This particular article aligns with the steps a responder will take in preparing for and responding to an attack.

Lock Down the Endpoint with Cyber Deception

Every device that connects to a network creates a security risk. There are many forms of defenses designed to protect these endpoints including anti-virus, firewalls, HIPS, endpoint detection and response (EDR), and other forms of access control. Most of these solutions require installed agents to manage authorizations and authentication, track device activities, and detect and remove viruses and malware. Despite the efforts applied to endpoint protection and EDR solutions, it is inherently insufficient. Even if you could find every endpoint, manage every agent, and keep every device consistently patched, there are fundamentally too many attack vectors to keep up with.

Webinar: Learn to SOAR with Deception Technology

Join us to learn how the Attivo Networks in-network deception technology can strengthen your existing Security Orchestration, Automation, and Response (SOAR) solution. SOAR addresses the issues that SOCs regularly deal with, such as the volume of alerts and a lack of experienced security personnel. The Attivo Networks ThreatDefend platform can help security teams address challenges …

Webinar: Learn to SOAR with Deception Technology Read More »

insider-threat-photo

Insider Threat – Tackling the Adversary Within

Written by: Mike Parkin – Product Marketing Engineer – I recently caught a webinar presented by ObserveIT that addressed the challenges presented by “insider threats.” They did a good job of defining the term, the threats, and they laid out some broad-stroke suggestions on how to address the problem. Something they didn’t talk about, was how deception technology is a powerful tool for dealing with this difficult problem.

resolutions image

Six 2019 Resolutions That Can Improve Organizational Cybersecurity

Authored by: Carolyn Crandall, The new year is upon us, and the need for comprehensive cybersecurity is as strong as ever. As threats that continue to evolve and expand, it is critical that organizations prepare for the future with a plan to address the most vulnerable aspects of their threat detection and response strategies. Breaches are already making headlines in 2019, and organizations are increasingly looking for ways to shift the balance of power away from the attacker.

Scroll to Top