deception technology Blog Terms - Page 30 of 32 - Attivo Networks

deception technology

Companies look beyond firewalls in cyber battle with hackers

With firewalls no longer seen as enough of a defense against security breaches, companies are looking at new tools to foil hackers trying to enter a computer network.

U.S. and Israeli startups are leading the way, with new approaches such as “honeytraps” that lure a hacker to fake data or “polymorphic” technology that constantly changes the structure of applications running on a computer.

Attivo Networks Named Finalist for Info Security Products Guide’s 2016 Global Excellence Awards

Attivo Networks was selected as a finalist for the 12th Annual 2016 Global Excellence Awards in the Deception Based Security category. These prestigious global awards recognize security and IT vendors with advanced; groundbreaking products and solutions that are helping set the bar higher for others in all areas of security and technologies.

Attivo Networks News

Attivo Networks Announces Real-Time Cyber Attack Detection for SCADA Devices

Attivo announces the new release of its deception-based Attivo BOTsink® solution that provides continuous threat detection on Industrial Control Systems (ICS) SCADA devices used to monitor and control most manufacturing operations as well as critical infrastructure such as natural gas, oil, water, and electric power distribution and transmission systems around the world.

Attivo Networks Announces Real-Time Cyber Attack Detection for SCADA Devices

I am pleased to share that today Attivo Networks® announced a new release of its deception-based Attivo BOTsink® solution that provides continuous threat detection on Industrial Control Systems (ICS) SCADA devices used to monitor and control most manufacturing operations as well as critical infrastructure such as natural gas, oil, water, and electric power distribution and transmission systems around the world.

Why Even the Best Cyber Security Solutions Fall Short

“A security solution is only as good as the weakest link” is one of those hackneyed phrases that keep popping up because it’s true. As the cyber attacks become increasingly sophisticated and numerous, the number of potential weak links also grows.

Weak links can span core parts of the security solution or areas peripheral to it. A core issue might be a firewall that the IT and security team deployed to protect a database, but is not equipped to block application-level attacks such as SQL injections.

Attivo Networks Signs Distributor Cloud Harmonics, Expands Access for Deception Security Solutions

Attivo Networks®, an innovator in information security threat detection, today announced a strategic distribution partnership with Cloud Harmonics, the leading cloud security solutions distributor. Attivo provides dynamic deception solutions to detect threats inside an organization’s enterprise, data center, and cloud environments in real-time. Cloud Harmonics provides channel partners with training, advanced services, and integrated technologies that add value to security, infrastructure, and cloud solutions.

A novel layer of security: Threat detection at Attivo Networks | #NXTWORK

Tushar Kothari, CEO of Attivo Networks, Inc., sat down with John Furrier and Stu Miniman, cohosts of theCUBE, from the SiliconANGLE Media team, during Juniper Networks NXTWORK 2015 to discuss Attivo’s unique security solution and integration with Juniper Networks, Inc.’s products, as well as the state of security among the industry.

Scroll to Top