EDR Blog Terms - Attivo Networks

EDR

It wire logo

Research finds attackers targeting Active Directory: 50% of businesses experienced an attack with >40% success

GUEST RESEARCH: Attivo Networks, the experts in preventing identity privilege escalation and detecting lateral movement attacks, today announced the availability of a new research report conducted by Enterprise Management Associates (EMA) and commissioned in part by Attivo Networks. The report focuses on Active Directory (AD), the directory-based identity services platform used by 90% of enterprises …

Research finds attackers targeting Active Directory: 50% of businesses experienced an attack with >40% success Read More »

Help Net Security Logo

Obstacles and threats organizations face when protecting AD

Attivo Networks announced the availability of a research report conducted by Enterprise Management Associates (EMA) which focuses on Active Directory (AD), exploring the obstacles and threats organizations face when protecting AD and how they adapt to address these growing concerns. As evidence of the value that attackers place in exploiting Active Directory and the privileges it contains, …

Obstacles and threats organizations face when protecting AD Read More »

Help Net Security Logo

How do I select a remote workforce protection solution for my business?

Comments from Carolyn Crandall, Chief Deception Officer, Attivo Networks When selecting a remote workforce protection solution, CISOs need to consider three key areas: exposed endpoints, security for Active Directory (AD) and preventing malware from spreading. Exposed endpoints: standard anti-virus software and VPNs are no match for advanced signature-less or file-less attack techniques. EDR tools enhance …

How do I select a remote workforce protection solution for my business? Read More »

Results Show Boost in APT Detection Rates with Attivo Endpoint Detection Net (EDN) Suite

Written by: Marc Feghali, Co-founder and VP of Product Management – Detecting more tactics of the MITRE ATT&CK® Matrix for Enterprise and achieving broader coverage is demonstrable when you incorporate the Attivo EDN suite to any EPP/EDR solution. The EDN suite produced an average increase of 42% in the detection rate when assessed with leading endpoint security solutions during a recent MITRE ATT&CK evaluation.

Game Changing Breach Defense by Dramatically Improving Endpoint Security

It’s 2020 and the breaches just keep coming. Join Attivo Networks CTO, Tony Cole, for a discussion with CDM on how to better protect your endpoints and prevent attackers from moving laterally across your enterprise. Attivo Networks has pioneered a new approach to protecting endpoints with their Endpoint Detection Net (EDN) solution. Designed to serve …

Game Changing Breach Defense by Dramatically Improving Endpoint Security Read More »

Webinar: Ed Amoroso, Tag Cyber, and CEO, Tushar Kothari, on Reducing Endpoint Risk

Join Tushar Kothari, CEO of Attivo Networks and Edward Amoroso, CEO of TAG Cyber for a technical discussion of how deception can be used to dramatically reduce cyber risks to modern endpoints. Hear about how popular endpoint detection and response ( EDR ) solutions can be enhanced via deceptive means to prevent malicious actors from …

Webinar: Ed Amoroso, Tag Cyber, and CEO, Tushar Kothari, on Reducing Endpoint Risk Read More »

Users of EPP or EDR Solutions Will Also Want to Do This

Written by: Carolyn Crandall, Chief Deception Officer and CMO – Even with the best Endpoint Protection (EPP) and Endpoint Detection and Response (EDR) solutions, a persistent attacker will eventually infiltrate a network. As a safety net to your prevention controls, the newly announced Attivo Endpoint Detection Net (EDN) Suite stands by to prevent the breakout or lateral movement of an attacker from an infected system.

Attivo Networks

Attivo Networks® Ambushes Attackers at the Endpoint

As Dwell Time Continues to Rise, Enhanced ThreatDefend Platform® Capabilities Close Detection Gaps and Opportunities for Lateral Movement. FREMONT, Calif.–(BUSINESS WIRE)–Attivo Networks®, the award-winning leader in deception for cybersecurity threat detection, today announced new capabilities within its ThreatDefend® Detection Platform that aim to anticipate methods an attacker will use to break out from an infected endpoint and ambush their every move. This unique approach to detection specifically focuses on reducing the time an attacker can remain undetected and the amount of effort required for an organization to restore environments to normal operations. This new Endpoint Detection Net offering will also serve as a powerful protection force-multiplier for businesses using Endpoint Protection (EPP) and Endpoint Detection and Response (EDR) solutions by closing detection gaps and facilitating automated incident response.

Webinar: Is it really possible to lock down an endpoint? Yes, but not how you might think.

Tune in with Fernando Montenegro, Analyst at 451 Research, and Carolyn Crandall, Chief Deception Officer, and CMO at Attivo Networks, for an engaging discussion on the latest Endpoint Security research, challenges organizations are facing today, and why deception technology has created a winning strategy for locking down the endpoint Endpoints are the primary target of …

Webinar: Is it really possible to lock down an endpoint? Yes, but not how you might think. Read More »

CISO Mag logo

Lock Down the Endpoint with Cyber Deception

Every device that connects to a network creates a security risk. There are many forms of defenses designed to protect these endpoints including anti-virus, firewalls, HIPS, endpoint detection and response (EDR), and other forms of access control. Most of these solutions require installed agents to manage authorizations and authentication, track device activities, and detect and remove viruses and malware. Despite the efforts applied to endpoint protection and EDR solutions, it is inherently insufficient. Even if you could find every endpoint, manage every agent, and keep every device consistently patched, there are fundamentally too many attack vectors to keep up with.

Scroll to Top