endpoint security Blog Terms - Attivo Networks

endpoint security

Attivo Networks® Launches CIEM Solution, Expanding its Identity Detection and Response (IDR) Portfolio

Attivo Networks®, the leader in identity detection and response, today announced a new Cloud Infrastructure Entitlement Management (CIEM) solution, IDEntitleX, designed to deliver visibility and reduce the attack surface for identities and entitlements in the cloud.

Attivo Networks & SentinelOne combine endpoint security offerings

Attivo Networks and SentinelOne have teamed up to combine cybersecurity defences and stop attackers in their tracks. The two companies will combine their solutions, bringing endpoint protection and attack disruption together as a joint solution to the market. Furthermore, Attivo Networks has also joined the SentinelOne Singularity Partner Program. “We are proud to work with …

Attivo Networks & SentinelOne combine endpoint security offerings Read More »

How to deal with IoT device proliferation

With the abundance of IoT devices proliferating into just about every aspect of life, it has become much harder to control their unwanted access. … When a new device connects to the network — by design or mistake — it can become complicated for security professionals to monitor these endpoints and devices. It’s no longer …

How to deal with IoT device proliferation Read More »

Using fake data to protect against cyberattacks

Separating truth from fiction in these days of social media campaigns and so-called fake news can often be challenging. As a result, false data that appears valuable can influence people. While such trends are a concern, deception can actually be a good thing for cybersecurity. Security teams are increasingly using fake data to deceive cybercriminals, …

Using fake data to protect against cyberattacks Read More »

SC-Magazine

Attivo Networks ThreatDefend Platform v5.0 (Review)

Security pros will find the Attivo ThreatDefend Platform a comprehensive detection product that uses machine learning to customize decoys based on the systems, applications, and environments into which it has been deployed. In other words, this unique design makes every endpoint part of the deception fabric. The platform campaigns drive early and accurate detection of …

Attivo Networks ThreatDefend Platform v5.0 (Review) Read More »

CDM Logo

Is What’s Lurking in Your Network About to Come Out?

The COVID-19 crisis was an unprecedented opportunity for attackers. Now, many may be ready to strike. … The COVID-19 pandemic has forced countless millions of people to work remotely, and the rush to enable that remote work created opportunities for attackers to infiltrate corporate networks due to new devices, unmanaged endpoints, security gaps, and other …

Is What’s Lurking in Your Network About to Come Out? Read More »

Attivo adds Ransomware 2.0 defences

Attivo’s EDN now improves file protection against human-operated ransomware by concealing and denying access to production mapped shares, cloud storage, and selected files or folders. … This limits the malware to the decoy environment, reducing the risk of a successful data compromise. Traditional endpoint protection or endpoint detection and response products work by signature matching …

Attivo adds Ransomware 2.0 defences Read More »

Businesses struggle to reduce hacker dwell time

Many firms don’t even track dwell time metrics. … One of the main challenges facing cybersecurity professionals is reducing hacker dwell time, according to a new report from Attivo Networks. Dwell time is described as the incubation period between the moment hackers compromise a network and when an attack is conducted – be it ransomware, …

Businesses struggle to reduce hacker dwell time Read More »

Webinar: Is it really possible to lock down an endpoint? Yes, but not how you might think.

Tune in with Fernando Montenegro, Analyst at 451 Research, and Carolyn Crandall, Chief Deception Officer, and CMO at Attivo Networks, for an engaging discussion on the latest Endpoint Security research, challenges organizations are facing today, and why deception technology has created a winning strategy for locking down the endpoint Endpoints are the primary target of …

Webinar: Is it really possible to lock down an endpoint? Yes, but not how you might think. Read More »

Attivo Networks® Achieves Certified Integration with DXL through the McAfee Security Innovation Alliance

Attivo Networks® today announced that it has achieved technical integration of the ThreatDefend™ Deception and Response platform with McAfee Data Exchange Layer (DXL). Through this partnership, Attivo Networks and McAfee address a rising need to close in-network detection gaps, shorten incident response times, and quickly and easily remediate compromised systems, leading to a simplified Threat Defense Lifecycle. This latest integration complements existing certifications with McAfee ePolicy Orchestrator, McAfee Enterprise Security Manager, and McAfee Network Security Platform.

Scroll to Top