detection Blog Terms - Attivo Networks

detection

Try the Award-Winning ADSecure Solution Free for 90-Days

Try the Award-Winning ADSecure Solution Free for 90-Days Start your 90-day free trial of the Attivo Networks ADSecure award-winning solution, ideal for organizations using Active Directory to authenticate and authorize users and computers in Windows domain networks. We Make it Easy and Simple No changes to Active Directory. Seamlessly integrate with your endpoint provider making …

Try the Award-Winning ADSecure Solution Free for 90-Days Read More »

Who is behind APT29? What we know about this nation-state cybercrime group

APT29 has been accused of targeting coronavirus vaccine organizations, but this is not the first time the group has attracted global attention … Who is behind APT29? What we know about this nation-state cybercrime group … Tony Cole, CTO at Attivo Networks, added: “It’s unfortunate that an actor such as APT29 with such sophisticated capabilities …

Who is behind APT29? What we know about this nation-state cybercrime group Read More »

Be Resilient: Using Cyber Deception to Combat Cyber Risk Following COVID-19

Written by: Carolyn Crandall, Chief Deception Officer and CMO – I recently read the Gartner guidance document on being resilient to prepare for cyber risk following the COVID 19 breakout. I thought it would be interesting to look at their guidance and to see how using Attivo deception technology can help.

RSA Conference 2020

What is the most powerful tool to prevent cyberattacks? It’s you. Your ideas, your creativity and your knowledge play a huge role in protecting the digital world. That’s why the theme of RSA Conference 2020 is Human Element. RSA Conference 2020 is here to support you in your mission—by bringing you together with thousands of …

RSA Conference 2020 Read More »

Webinar: Is it really possible to lock down an endpoint? Yes, but not how you might think.

Tune in with Fernando Montenegro, Analyst at 451 Research, and Carolyn Crandall, Chief Deception Officer, and CMO at Attivo Networks, for an engaging discussion on the latest Endpoint Security research, challenges organizations are facing today, and why deception technology has created a winning strategy for locking down the endpoint Endpoints are the primary target of …

Webinar: Is it really possible to lock down an endpoint? Yes, but not how you might think. Read More »

Time to turn the tables on cyber-attackers

Outwitting one’s enemy has been a key element of warfare since the ancient Greeks began laying siege to the city of Troy. That 10-year mythological conflict was brought to a sudden end through the use of subterfuge in the form of a giant wooden horse, concealing an elite fighting force, which was wheeled into the citadel by the unsuspecting Trojans. More recently, the Allied nations employed an equally effective deception strategy to divert the German high command’s attention away from Normandy, the planned site of the 1944 invasion, which signalled the beginning of the end of World War II.

Attivo Networks ThreatDefend Platform’s Breakthrough Capabilities Extend Company’s Leadership Over Traditional Deception Technology

Company Receives Top Recognition for Next-Gen Technology in Cyber Defense Magazine’s Global 2019 Global Awards FREMONT, Calif. – October 24, 2019 – Attivo Networks®, the award-winning leader in deception for cybersecurity threat detection, today revealed several proof points surrounding its deception technology innovation and market momentum, along with recognition of its technology leadership for “Next Gen Deception Based Security” in the Cyber Defense Magazine 2019 Global Awards. Earlier this year, Attivo Networks was also recognized as the market leader for deception-based security in the Cyber Defense Magazine 2019 InfoSec Awards.

Attivo Networks Named 2020 TAG Cyber Distinguished Vendor

FREMONT, Calif – Sept. 24, 2019 – Attivo Networks, the award-winning leader in deception for cybersecurity threat detection, announced today its selection by TAG Cyber as a Distinguished Vendor in this year’s 2020 Security Annual for the fourth consecutive year. Published each September, the report offers expert guidance, analysis, and education on 50 different aspects of the cybersecurity ecosystem, making it one of the most comprehensive and respected informational reports available in the industry.

The Art of Deception

In just a few years’ time, deception technology has matured to become a critical – and recommended – element of fundamental cybersecurity defense. Tony Cole of Attivo Networks discusses critical success factors for deploying deception. In a video interview at Information Security Media Group’s recent Cybersecurity Summit in New York, Cole discusses:

Scroll to Top