security Blog Terms - Page 2 of 3 - Attivo Networks

security

channel pro network

Meet the 2019 ChannelPro Vendors on the Vanguard

Job No. 1 for any provider of security services is to keep bad guys out of customer environments. When those efforts fail—and they will eventually, no matter how good you are—Job No. 2 is spotting the breach and mitigating its effects. That’s where Attivo Networks aims to help. In a new spin on the threat detection and response products businesses increasingly use to undo the effects of successful attacks, Attivo makes a threat deception and response solution that employs various kinds of decoys and lures to fool intruders into exposing their presence inside the firewall. Preassembled incident response processes can then kick in to implement automated, orchestrated remediation measures. The system is designed to be easy enough for small businesses to deploy and operate, and it’s priced to fit SMB budgets as well.

Why Threat Deception Technology Adoption is Soaring

Unlike other security solutions, Attivo focuses on detecting the threats that have bypassed perimeter security controls, which all determined attackers eventually do. Highly authentic deception traps, along with data, application, and credential lures are deployed to attract an attacker into engaging and revealing their presence. This is quick, efficient, and customers have cited being able to detect and respond to threats in 15 minutes, a dramatic difference compared to the 100+ days of dwell time that many organizations contend with. The solution also adds continuous detection value throughout the phases of the kill chain.

digital health age

How deception can combat the cybersecurity threat to medical devices

In an interview with Digital Health Age web content editor Ian Bolland, Crandall explained the issues that are affecting medical devices when it comes to cybersecurity, including being built on operating systems that were designed to be in networks that are not interconnected. While things are getting connected, the devices that are going onto networks were never designed to be secure in such a way, and the ownership of security is a contentious issue.

enterprisers-project

Kubernetes security: 4 tips to manage risks

Chris Roberts, an adviser at Attivo Networks, concurs that role-based access control (RBAC) must be enabled for robust Kubernetes security, and adds that many elements of a strong security posture remain relevant in container environments: Good policies, procedures, and controls at the user, application, and network layer; separate and segmentation (including firewalls) where possible; rotating encryption keys; and strong education and integrations among different roles and teams.

CRN Tech Awards

Attivo Networks® Wins 2018 CRN® Tech Innovator Award

Company’s ThreatDefend™ Platform Takes Top Honors in the 2018 Cloud Security Category. Attivo Networks announced today that CRN,® a brand of The Channel Company, has recognized Attivo Networks with the 2018 CRN Tech Innovator Award for Cloud Security. The CRN annual awards honor standout hardware, software, and services that are moving the IT industry forward. In compiling the 2018 Tech Innovator Award list, CRN editors evaluated 300 products across 34 technology categories using several criteria, including technological advancements, uniqueness of features, and potential to help solution providers solve end users’ IT challenges. The Attivo Networks ThreatDefend™ Detection and Response platform took top honors in the Cloud Security category.

Attivo Networks Logo

Attivo Networks® Announces New Leadership in UK and Ireland, Responding to Global Demand for Deception Technology

Attivo Networks today named security industry veteran Mark Howell as the company’s new Vice President of UK and Ireland operations. A widely respected business development leader specializing in delivering new solutions in European markets, Howell will continue to build out the company’s expanding customer and partner base. Last year, Attivo Networks grew in revenue by more than 300 percent as enterprises continue to invest in deception-based threat detection solutions to battle the escalating number and scale of security breaches and cyberattacks globally.

CSO logo

Security software reviews: How cutting-edge products fare against the latest threats

We go hands-on with some of the most innovative, useful and, arguably, best security tools from today’s most important cybersecurity technology categories.

Attivo addresses the one main weakness of most deception technology, having to rely on other programs to respond to an attack once revealed by the deception network. The Attivo platform offers quick response capabilities and the ability to interact with third-party programs for additional backup, configured using an intuitive drag and drop interface that requires very little training. After that, things like internal sandboxing and phishing e-mail protection are just icing on the cake of an already very impressive product.

Popular TV cable company impacted by data breach of up to 4 million personal records

The personal records of up to four million Time Warner Cable customers were possibly leaked via an unsecured Amazon server. The breach, which involved more than 600GB of data (the equivalent of 20 HD movies), was discovered by Cologne, Germany-based cybersecurity firm Kromtech.

Charter Communications bought Time Warner Cable last year, and the two companies currently operate under the Spectrum brand name. Prior to its purchase, Time Warner was the second-largest cable company in the U.S. and operated in 29 states.

Scroll to Top