IDR Archives - Attivo Networks

IDR

SentinelOne to acquire Attivo Networks for $617 million

SentinelOne has announced its intent to acquire identity detection and response expert Attivo Networks for $616.5 million in cash and equity. The acquisition will allow SentinelOne to further expand its artificial intelligence (AI)-powered capabilities to address identity-based threats, paving the way for advanced enterprise zero trust and extended detection and response (XDR) solutions. “The shift to hybrid work and increased …

SentinelOne to acquire Attivo Networks for $617 million Read More »

CYBERSECasia-logo

A black cat on the prowl: new ransomware making its rounds globally

Attacking the Active Directory and human-operated, the double-extortion ransomware group has already been spotted in the Philippines. A new sophisticated ransomware campaign is on the rise, claiming victims in the US, Europe and the Philippines. The ALPHV BlackCat ransomware is human-operated and command-line driven, which makes it hard for traditional detection tools to accurately alert on these …

A black cat on the prowl: new ransomware making its rounds globally Read More »

Sarah Ashburn of Attivo Networks Named to 2022 Channel Chiefs by CRN

FREMONT, Calif. — Feb. 8, 2022 — Attivo Networks®, the experts in identity security and lateral movement attack prevention, today announced that Sarah Ashburn, the company’s SVP of sales and customer success, was named to the high-profile list of 2022 Channel Chiefs. The designation, awarded by CRN, a brand of The Channel Company, recognizes a select group of influential …

Sarah Ashburn of Attivo Networks Named to 2022 Channel Chiefs by CRN Read More »

Identity-Based Attack Innovation Drives the Demand for a New Security Approach

Identity-Based Attack Innovation Drives the Demand for a New Security Approach

Written by: Michelle Plato, Sr. Solution Marketing Manager – With the rise of ransomware 1.0 and 2.0 attacks – which doubled in occurrences from 2019 to 2021, comprising 10% of all breaches – it is obvious why identity security should sit at the top of the CISO’s priority list. The volume of innovative attack activity in 2021 supports evidence that attackers will continue to evolve their identity-focused exploit efforts moving forward. According to the 2021 Verizon Data Breach Investigations Report, the “human element” factors into 85% of breaches, with credential data theft and misuse now factoring into 61% of all such incidents. These figures prove attackers consistently attempt to access valid credentials and use them to move throughout networks undetected. These challenges drive the need to implement security solutions that effectively guard the new identity-based perimeter.

Attivo Networks® Scores Three Platinum 2021 ‘ASTORS’ Homeland Security Awards

Company Recognized for Groundbreaking Identity Detection and Response Technology — FREMONT, Calif., Nov. 30, 2021 — Attivo Networks®, the experts in identity security and lateral movement attack prevention, announced today that it won three times in the prestigious 2021 ‘ASTORS’ Homeland Awards program. The Awards Include: IDEntitleX – Platinum Award Winner – Best Cloud Security Solution Attivo’s Identity Detection and …

Attivo Networks® Scores Three Platinum 2021 ‘ASTORS’ Homeland Security Awards Read More »

Identity Detection and Response Technology Gives Zero Trust a Boost

By Carolyn Crandall, Chief Security Advocate, Attivo Networks Zero trust has been a hot topic in the cybersecurity community for several years, mainly because attackers have gotten better at bypassing perimeter defenses and infiltrating networks. All too often, they are free to move laterally with little fear of detection once inside. Zero-trust architecture (ZTA) provides …

Identity Detection and Response Technology Gives Zero Trust a Boost Read More »

Data Center Knowledge logo

Cloud Identity Is ‘New Normal’ Replacement for On-Prem Tools

With the rise of work-from-home, SaaS, IoT, cloud, mobile and edge computing, the traditional on-premises identity and authentication systems are becoming obsolete, giving way to cloud identity Today’s data center has very little in common with that of a few years ago. The old model of on-prem servers surrounded by a tough, secure perimeter is …

Cloud Identity Is ‘New Normal’ Replacement for On-Prem Tools Read More »

It wire logo

Research finds attackers targeting Active Directory: 50% of businesses experienced an attack with >40% success

GUEST RESEARCH: Attivo Networks, the experts in preventing identity privilege escalation and detecting lateral movement attacks, today announced the availability of a new research report conducted by Enterprise Management Associates (EMA) and commissioned in part by Attivo Networks. The report focuses on Active Directory (AD), the directory-based identity services platform used by 90% of enterprises …

Research finds attackers targeting Active Directory: 50% of businesses experienced an attack with >40% success Read More »

Help Net Security Logo

Obstacles and threats organizations face when protecting AD

Attivo Networks announced the availability of a research report conducted by Enterprise Management Associates (EMA) which focuses on Active Directory (AD), exploring the obstacles and threats organizations face when protecting AD and how they adapt to address these growing concerns. As evidence of the value that attackers place in exploiting Active Directory and the privileges it contains, …

Obstacles and threats organizations face when protecting AD Read More »

Attivo Networks® Brings Identity Security to the Next Level with a New Method of Credential Protection

Company expands its Identity Detection and Response portfolio with Credential Cloaking and Policy-based Application Access FREMONT, Calif. – September 8, 2021 – Attivo Networks®, the leader in identity detection and response, today announced a revolutionary new way of protecting credentials from theft and misuse. As part of its Endpoint Detection Net (EDN) Suite, the ThreatStrike® …

Attivo Networks® Brings Identity Security to the Next Level with a New Method of Credential Protection Read More »

Scroll to Top