ThreatPath Blog Terms - Attivo Networks

ThreatPath

Reduce the Attack Surface

Checklist for Reducing the Addressable Attack Surface Using ThreatPath

Written by: Vikram Navali, Senior Technical Product Manager – Over the last couple of months, the news has reported many cyberattacks, a dire warning for organizations to prepare or become victims of a breach. According to the Verizon Data Breach Investigation Report (DBIR), over 80% of hacking-related breaches involve brute force or the use of lost or stolen credentials. It is not altogether possible to prevent credentials from getting compromised. However, understanding the addressable attack surface and implementing security controls is a holistic approach that makes it difficult for an adversary to compromise one’s network.

Attivo Networks® Announces Continuous Assessment and Enforcement of Privileged Access

FREMONT, Calif. – March 3, 2021 – Attivo Networks®, the industry experts in lateral movement attack detection and privilege escalation prevention, today announced the expansion of its Active Directory protection suite of products with a new and innovative way to discover and remediate exposures in Active Directory (AD) that could lead to breaches.

SolarWinds Supply Chain Attack: Automating Incident Response to Detect Lateral Movement

Author: Attivo Research Team – SolarWinds issued an advisory on 13 December 2020 informing users of a sophisticated attack on its Orion Platform, an application that monitors and manages IT environments. FireEye analyzed the SolarWinds Orion Platform code compromise (dubbed SUNBURST) and shared further post-analysis details in a recently released blog.

New version of ThreatPath detects and eliminates exposure of credentials at the endpoint

Attivo Networks has expanded its ThreatPath solution, which is part of the modular ThreatDefend Endpoint Detection Net (EDN) product family. … ThreatPath continuously monitors the threat posed by exposed access data and now offers companies additional options for identifying high-risk threats and automatically eliminating them. These include identities with excessive privileges, unprotected application data sources, …

New version of ThreatPath detects and eliminates exposure of credentials at the endpoint Read More »

Help Net Security Logo

Attivo Networks ThreatPath now addresses proliferation of endpoints and credential protection challenges

Attivo Networks announced innovative enhancements to its ThreatPath solution, part of the modular ThreatDefend Endpoint Detection Net (EDN) family of products. ThreatPath, which continuously observes and shows credential exposures, now also provides organizations with the ability to identify and automatically remediate high-risk exposures based on identities with excess privileges, application data sources, at-risk practices such …

Attivo Networks ThreatPath now addresses proliferation of endpoints and credential protection challenges Read More »

Attivo ThreatPath helps reduce credential exposures

Attivo Networks has updated its ThreatPath credential exposure tool to identify and remediate high-risk exposures based on identities with excess privileges, application data sources, at-risk practices such as local admin credentials stored on the endpoint, and shadow admin accounts. The idea behind ThreatPath is to help organisations get on the front foot as far as …

Attivo ThreatPath helps reduce credential exposures Read More »

Attivo Networks Enhances Portfolio for Amplified Identity Access Management Control

ThreatPath Release Addresses Proliferation of Endpoints and Credential Protection Challenges … Attivo Networks®, an award-winning leader in cyber deception and attacker lateral movement threat detection, today announced innovative enhancements to its ThreatPath® solution, part of the modular ThreatDefend® Endpoint Detection Net (EDN) family of products. ThreatPath, which continuously observes and shows credential exposures, now also …

Attivo Networks Enhances Portfolio for Amplified Identity Access Management Control Read More »

Cyber Hygiene – What’s in your Network?

Written by: Venu Vissamsetty, Vice-President of Security Research – Cyber Hygiene relates to the practice of keeping data safe and secure within the organization network. Organizations across the world are moving towards deploying IoT devices, adopting cloud computing as well as growing usage of applications which require additional access controls and password management.

In a recent security incident, attackers gained access to an organization’s network through a compromised external user system and targeted a Raspberry Pi computer that was not authorized to be attached to the network.

The attack highlights the significance of cyber hygiene and best practices to follow.

Hats Off to an Incredible Black Hat 2016

We participated in Black Hat 2016 and came back excited at the new opportunities available for Attivo. I was personally respectfully impressed by how resourceful cyber attackers have become – it is mind blowing that even our smart light bulbs can leave us susceptible to attack! As one of the go-to events for the information security community, we appreciated the opportunity to educate and update attendees on Attivo solutions, as well as launch our latest version of software and offering of ThreatPath™ for attack path prediction at Black Hat!

Scroll to Top