EDN

Endpoints as Bait for Attackers

Attivo Networks has expanded the functionality of its ThreatDefend detection platform. These aim to anticipate an attacker’s behavior when it compromises a corporate network from an infected endpoint. ThreatDefend lures the attacker into an ambush if he moves in the network. The goal is to shorten the dwell time, i.e. the time span in which …

Endpoints as Bait for Attackers Read More »

Users of EPP or EDR Solutions Will Also Want to Do This

Written by: Carolyn Crandall, Chief Deception Officer and CMO – Even with the best Endpoint Protection (EPP) and Endpoint Detection and Response (EDR) solutions, a persistent attacker will eventually infiltrate a network. As a safety net to your prevention controls, the newly announced Attivo Endpoint Detection Net (EDN) Suite stands by to prevent the breakout or lateral movement of an attacker from an infected system.

Attivo Networks

Attivo Networks® Ambushes Attackers at the Endpoint

As Dwell Time Continues to Rise, Enhanced ThreatDefend Platform® Capabilities Close Detection Gaps and Opportunities for Lateral Movement. FREMONT, Calif.–(BUSINESS WIRE)–Attivo Networks®, the award-winning leader in deception for cybersecurity threat detection, today announced new capabilities within its ThreatDefend® Detection Platform that aim to anticipate methods an attacker will use to break out from an infected endpoint and ambush their every move. This unique approach to detection specifically focuses on reducing the time an attacker can remain undetected and the amount of effort required for an organization to restore environments to normal operations. This new Endpoint Detection Net offering will also serve as a powerful protection force-multiplier for businesses using Endpoint Protection (EPP) and Endpoint Detection and Response (EDR) solutions by closing detection gaps and facilitating automated incident response.

Organizations Aren’t Doing Enough to Secure Active Directory

Written by: Marc Feghali, VP of Product Management – Microsoft launched Active Directory (AD) in the late 90s, and it quickly became the standard in the identity management market. For any company, AD is the crown jewels of its IT infrastructure, as inside AD resides a complete list of all the users, machines, logical grouping, and privileges. This confluence of information is compelling, and it enables modern operations and user experiences at work, in transit, or at their home offices. Also, other programs leverage AD to determine access and level of privilege to the users.

Scroll to Top