Support Login.

seventeen − 17 =

 

Attivo Networks Wins Three 2017 ‘ASTORS’ Homeland Security Awards

 

Attivo Networks Wins Three 2017 ‘ASTORS’ Homeland Security Awards

Attivo Networks®, the award-winning leader in deception technology for cybersecurity defense, announced today that it won the 2017 ASTORS Homeland Security Awards in three key categories.

The Awards Include:

ThreatOps™ – Platinum Award Winner – Best Integrated Security Management Solution
ThreatDefend™ Deception and Response Platform – Gold Award Winner – Best Critical Infrastructure Solution
ThreatDefend™ Deception and Response Platform – Gold Award Winner – Best Intrusion Detection and Prevention Solution

“We are honored that American Security Today recognized Attivo Networks® deception solutions in three critical security categories,” said Tushar Kothari, CEO of Attivo Networks.

“To effectively respond to rapidly evolving security threats, governments and private organizations need access to innovative solutions that deliver early threat detection and accelerated incident response.”

“These wins are a powerful validation of the value that deception technology provides by changing the asymmetry of the attack against today’s sophisticated cybercriminals and by combatting modern Homeland Security challenges.”

The Attivo Networks ThreatDefend™ platform uses authentic, high-interaction decoys that appear identical to production assets, attractive lures, and adaptive deception campaigns to turn the entire network into a trap, creating a setting where what is real and what is not becomes unclear to the attacker.

Network, endpoint, Active Directory, application, and data deceptions reduce time to detection, while automated attack analysis, high-fidelity alerts, third-party integrations, and playbooks accelerate incident response.

The Attivo Networks ThreatOps™ solution accelerates incident response by automating the process to take disparate attack information, correlate it and then display it within one dashboard where attacks can be scored and playbooks created.

The playbooks are then used to create repeatable processes, simplifying incident response.

Through third-party integration with prevention systems (Firewall, NAC, End-point, SIEM), attacks are automatically blocked and quarantined, expediting response actions and preventing the attack from continuing to spread through the network.

Read more>>>