IoT Blog Terms - Page 6 of 6 - Attivo Networks

IoT

Attivo Networks Claims First to Use Deception Security in IoT

New-gen security provider Attivo Networks, which mimics a real IT system using a deception approach that lures bad actors in and then traps them, has expanded its reach to serve the budding IoT (Internet of things) market.
The Fremont, Calif.-based company has been successful for five years with its on-premises, server-loaded service and a cloud version on Amazon Web Services, but as of June 1 now offers its own brand of real-time threat detection and fast incident response specifically for IoT environments.
This new enhancement to the Attivo service complements the company’s Deception Platform that already supports user networks, data centers, cloud and ICS-SCADA (Industrial Control Systems-Supervisory Control and Data Acquisition) environments, CEO Tushar Kothari told eWEEK.

Attivo Networks Announces 1st in Real-time Threat Detection for the Internet of Things (IOT)

This week Attivo Networks announced the first deception-based threat detection platform for the Internet of Things. This is another example of Attivo innovation and high demand for threat detection products, developed as a direct result of customer demand and the need for new approaches to security in an ever-changing security landscape. Our customer engagements have grown into the hundreds in a wide variety of vertical markets and corporate sizes and with this we have seen a strong demand for real-time detection in user-networks, data centers, cloud, ICS-SCADA and most recently in IoT. With Gartner forecasting 6.4 connected things to be in use worldwide this year there is a tremendous need for a solution to this new set of cybersecurity risk and the need for real-time attack detection. The new enhancement is available as a feature in the Attivo BOTsink Deception Platform and will allow organizations to configure the Attivo deception servers and decoys to look identical to IoT devices.

Attivo Networks Provides First Deception-based Threat Detection Platform for Internet of Things (IoT)

FREMONT, Calif., May 24, 2016— Attivo Networks®, the award-winning leader in deception for cyber security threat detection, today announced an expansion of the Attivo Deception Platform, which provides real-time threat detection and accelerated incident response, to now support the Internet of Thing (IoT) ecosystem. This new enhancement complements the existing Deception Platform that supports user networks, data centers, cloud and ICS-SCADA environments. “Gartner forecasts that 6.4 billion connected things will be in use worldwide in 2016, up 30 percent from 2015”[1], bringing a whole new set of cybersecurity risk and the need for real-time attack detection.

Attivo Networks

Attivo Networks Provides First Deception-based Threat Detection Platform for Internet of Things (IoT)

Attivo Networks today announced an expansion of the Attivo Deception Platform, which provides real-time threat detection and accelerated incident response, to now support the Internet of Thing (IoT) ecosystem. This new enhancement complements the existing Deception Platform that supports user networks, data centers, cloud and ICS-SCADA environments. “Gartner forecasts that 6.4 billion connected things will be in use worldwide in 2016, up 30 percent from 2015”, bringing a whole new set of cybersecurity risk and the need for real-time attack detection.

IoT a heaven for hackers

Those still finding it hard to envision the extent of the impact the Internet of Things’ (IoT) will have on the way people live and work should try this: imagine for a moment the reality of a life without internet connectivity or the existence of the World Wide Web. Do you feel anxious, stressed, fearful and insecure? In less than ten years’ time, we’re expected to already be irreversibly dependent on an IoT-enabled reality.

IoT Security: It’s All About the Process

Not long ago, nearly a thousand globally dispersed CCTV cameras were revealed to be enslaved to an IoT botnet for launching DDoS attacks. This news followed research indicating that several baby monitor products were laden with vulnerabilities exposing connected-home systems to a breach. And let’s not even get started on the YouTube Tea Kettle hack video.

These recent examples show how little effort is required for hackers to exploit unsecured devices, and they rightly renew fears about how the rise of the Internet of Things (IoT) is being outpaced by a rise in risks to user data, privacy and devices.

Scroll to Top