Attivo Networks News

Attivo Networks uses active deception to trap attackers inside your network

Reading Time: 2 minutes  |  Published: September 4, 2015 in Attivo News, Industry News, Spotlight


You’ve heard of using decoydocs to attract malicious actors. Attivo Networks expands on this concept to engage with any attacker, human or otherwise, that has found its way inside your network.

The number of U.S. data breaches tracked in 2014 hit a record high of 783, according to the Identity Theft Resource Center(ITRC), a whopping 28% increase over the number reported in 2013, and an 18% jump over the previous high of 662 in 2010. And the news gets worse. The ITRC reports that data breaches in 2015 are on pace to break records both in the number of breaches and the number of records exposed…

With the massive changes in IT infrastructure, the disappearance of the network perimeter, and the failure of existing technologies to prevent malware, there’s a dire need for solutions that can quickly detect attacks before real damage is done. The founders and engineers of Attivo Networks looked at this problem and developed a last line of defense they call “dynamic deception.” It’s designed to attract, engage and trap any malicious actor – human, bot or APT – that gets inside your network with the intention of doing harm.

Once installed on your network and endpoint devices, Attivo creates a deception that makes an attacker think that the Attivo environment is the real target. Inside the Attivo product are multiple real operating systems, servers and services—the kind of things that hackers, bots and APTs are designed to look for. Attivo’s solution inserts itself in multiple places across the network and uses advanced dynamic luring to purposely attract the attack. Once it is attacked, Attivo knows which devices are impacted and where the attack is coming from. Attivo lets the attack play out within its system – where it is totally isolated from your real network – in order to provide the threat intelligence you need to neutralize the attack and the full forensics to capture method and intent…

Read More>>

No Comments

Post a Comment

one × 2 =