Identity and Access Management Blog Terms - Attivo Networks

Identity and Access Management

Invest in Advanced Identity Detection and Response Solutions

By Carolyn Crandall, Chief Security Advocate, Attivo Networks The perimeter disappeared when remote working came along, and all the security mechanisms for protecting information assets behind a firewall, were no longer adequate. The attack surface has broadened to include home networks, and the attack vectors are directed towards home users. There are also devices and …

Invest in Advanced Identity Detection and Response Solutions Read More »

Beyond Identity Access Management: The Next Steps in Post-Perimeter Defense

By Carolyn Crandall, Chief Security Advocate, Attivo Networks The last few years have seen an increased acceptance that traditional perimeter-based defenses such as firewalls are not enough, and that attention needs to shift to identity security. This approach focuses on verifying the identity of users with a high degree of accuracy, working on the assumption …

Beyond Identity Access Management: The Next Steps in Post-Perimeter Defense Read More »

TAG Cyber Security Annual 4th Quarter: PREVENTING AND DETECTING LATERAL MOVEMENT

Register for Nov. 3 webinar, “Chris Krebs: What’s Buried in Every Breach Report that No One is Talking About” When advanced attacks are initiated toward an enterprise, several familiar tactics are almost always used to gain privilege, traverse infrastructure, and advance the goals of the breach. Unfortunately, these steps are rarely addressed by existing cyber …

TAG Cyber Security Annual 4th Quarter: PREVENTING AND DETECTING LATERAL MOVEMENT Read More »

security-boulevard-logo

3 Keys to Defending Active Directory

While perimeter defenses like firewalls and antivirus software remain essential elements of comprehensive network defense, stopping 100% of attacks at the perimeter is an impossibility with today’s ever-evolving attack surface. Eventually, an attacker will successfully breach those defenses, establishing a beachhead within the network from which they can move laterally to escalate their privileges, identify …

3 Keys to Defending Active Directory Read More »

Attivo Networks Enhances Portfolio for Amplified Identity Access Management Control

ThreatPath Release Addresses Proliferation of Endpoints and Credential Protection Challenges … Attivo Networks®, an award-winning leader in cyber deception and attacker lateral movement threat detection, today announced innovative enhancements to its ThreatPath® solution, part of the modular ThreatDefend® Endpoint Detection Net (EDN) family of products. ThreatPath, which continuously observes and shows credential exposures, now also …

Attivo Networks Enhances Portfolio for Amplified Identity Access Management Control Read More »

Scroll to Top