data security Archives - Attivo Networks

data security

Organizations need to adopt an identity-first security approach, says Attivo VP

Ray Kafity, Vice President – Middle East, Turkey, and Africa (META) at Attivo Networks, shared with us some insight on cybersecurity in hybrid work environments and protecting VPN connections. TECHx: How has hybrid working impacted cybersecurity? Kafity: A few years back, a hybrid workforce was more an exception than the norm. However, with the pandemic, this has changed significantly. Now 84% of …

Organizations need to adopt an identity-first security approach, says Attivo VP Read More »

Securing Active Directory

Active Directory (AD) is a standard tool used by most organizations to regulate users and machines accessing the company’s resources. However, it can be both a blessing and a curse: as the central repository for all the information relating to the network – credentials, users, computers, applications, and so on – AD is essential to …

Securing Active Directory Read More »

Channel Futures Logo

Data Manipulation: The Next Level of Cyberattacks

Today, cyberattacks aim to steal information or hijack infrastructure. While these threats are damaging enough, nation states and bad actors are not resting on their laurels. Next up in their nasty bag of tricks is blowing a hole in data integrity via unauthorized data changes, planting false information, changing sensor reads, and other data modifications and entanglements sure to create chaos and even death. While any data validation tool, such as blockchain, will likely prove helpful, tools that can spot and stop these attacks will be doubly so.

BioWorld MedTech Logo

BD and Attivo Partner to Thwart Cyberattacks

As medical devices incorporate connectivity, they provide greater opportunities for convenience, service, and information for consumers and companies, but also are increasingly vulnerable to cyber threats. In this environment, Attivo Networks and Becton, Dickinson and Co. (BD) have validated a deception solution for medical technology cybersecurity threats through a partnership bringing Attivo’s Botsink solution to a select number of BD devices. The two firms collaborated through BD’s Product Security Partnership Program and created “mirror-match decoy authenticity” software for some of BD’s devices, a method designed to redirect an attack from reaching important information or networks.

Attivo Networks Logo

Deception Technology Leader Attivo Networks Announces Investment from Singtel Innov8, Accelerating Global Expansion

Attivo Networks® today announced a strategic investment by Singtel Innov8, the venture capital arm of the Singtel Group. The funding will be used to accelerate expansion into Asia Pacific markets with increased investment in sales, marketing and customer support operations in support of growing global deception technology customer base. Singtel Innov8 joins current investors Bain Capital Ventures, Omidyar Technology Ventures and Trident Capital Cybersecurity, who have collectively provided $47.5 million in funding to Attivo Networks.

Why Deception Technology Will Change The Game In Our Favor Against Cybercrime And Breaches

Then, I heard about Attivo and as one of the four CDM judges on our Infosec Awards from 2017, with them being one of our winners, receiving an overwhelming positive vote from the judges, I wanted to dig into what they are up to a little further and look at them within the purview of the Time-based Security model – could a solution like the Attivo ThreatDefendTM Deception and Response Platform actually deliver a way to slow down the breaches, because, frankly, we’re not yet going fast enough to stop them?

Security Now Logo

Startup Attivo Advocates for ‘Deceptive’ Security Protection

Is it next-generation threat detection? Is it counter-hacking? One thing we know is that it’s designed to lure hackers to a replica enterprise environment so that threats can be eliminated. It’s deception.

“Why does this company exist? It really boils down to that a perimeter-based defense is just not reliable anymore,” Carolyn Crandall, chief deception officer and CMO at Attivo Networks told Security Now. “People can and will get into the network, and over the last couple of years, people are accepting that.”

Crandall is adding her voice to a growing number of experts that agree the better strategy is to accept that penetration is inevitable and therefore the focus should be on protecting the data in the network, not erecting a fence.

Scroll to Top