Partnership Blog Terms - Attivo Networks

Partnership

Attivo Networks Excellence Awards Honor Partners Driving Cybersecurity Innovation Across North America, LATAM, META, APAC and the UK

FREMONT, Calif.–(BUSINESS WIRE)–Attivo Networks®, an award-winning leader in cyber deception and attacker lateral movement detection, today announced recipients of its inaugural Excellence Awards, which honor partners driving innovation and delivering effective, comprehensive cyber security solutions for their customers. Culminating in two categories, “Partner of the Year” and “Project of the Year,” the awards recognize Attivo’s global partners in Latin America (LATAM), Middle East, Turkey, and Africa (META), Asia-Pacific (APAC), North America, and the United Kingdom (UK).

Attivo Networks & SentinelOne combine endpoint security offerings

Attivo Networks and SentinelOne have teamed up to combine cybersecurity defences and stop attackers in their tracks. The two companies will combine their solutions, bringing endpoint protection and attack disruption together as a joint solution to the market. Furthermore, Attivo Networks has also joined the SentinelOne Singularity Partner Program. “We are proud to work with …

Attivo Networks & SentinelOne combine endpoint security offerings Read More »

Attivo Networks Announces Integration with Microsoft Azure Security Center for IoT

Companies will Deliver Solution Optimized for Detection and Response of Attackers Targeting Azure IoT Edge Devices

FREMONT, Calif – February 20, 2020 – Attivo Networks®, an award-winning leader in deception for cybersecurity threat detection, today announced an integration with Microsoft to further enhance detection and response for Azure IoT Edge with the ThreatDefend® platform. Since the intelligent edge is a prime target for attackers, Azure IoT Edge actively addresses these inherent risks by collaborating with innovative security companies such as Attivo who are effective at efficiently detecting attackers in these emerging environments. The integration provides customers a reliable way to quickly and confidently detect, redirect, and respond to in-network attackers.

Fortinet Fabric-Ready Partner Spotlight: Attivo Networks

Q&A with Carolyn Crandall, CMO at Attivo Networks

Fortinet sits down with Fabric-Ready Partner, Attivo Networks, to learn what’s top of mind for its customers, the key IT challenges they are facing, and how Attivo Networks’ approach to integrated security is helping drive business and customer success.

Tell us a bit about Attivo Networks business and the types of customers that you serve.

Attivo Networks® is the leader in deception for cyber security defense. Founded on the premise that even the best security systems cannot prevent all attacks, Attivo provides the required in-network visibility and substantiated, actionable alerts to detect and analyze cyber attacks, and accelerates defense through integration with prevention systems.

The core solution offered is the ThreatMatrix™ Deception-Based Threat Detection and Continuous Response Platform, which is a comprehensive deception platform for detecting all types of threat vectors in user networks, data centers, and specialty environments of SCADA, IoT, and POS.

Since ThreatMatrix is not inline, installation is frictionless, highly scalable, and does not require process changes or network redesign. Many Fortune 500 companies and mi

The Evolving Nature of Healthcare Network Security Threats

For many years, Healthcare records have been extremely valuable to the criminal world. In 2014, it was reported that Healthcare records were 10x more valuable than standard financial data – as the opportunity for identity theft and medical fraud utilizing those stolen records was much higher. Despite a fairly steady drop in the black-market prices of medical records since then, they are still a high-value hacking target, with reported incidents still coming in. The drop in value has precipitated an increase in ransomware, which encrypts target files and asks owners for a sum of money for the encryption key. This has the advantage of not actually having to remove files or figure out how to sell them afterwards.

Lights, Cameras, Hack(tion)

It had all the makings of a blockbuster horror movie: Malicious actors, ineffective agents and plenty of cameras. However, in last week’s hack through thousands of IoT devices, the carnage was real. The irony here is that the surveillance cameras companies use to monitor events within and around their buildings are the same systems responsible for rendering them helpless last week.

Scroll to Top