Attivo Networks News

Attivo traps cyber criminals

Reading Time: 2 minutes  |  Published: May 18, 2020 in Attivo News

IoT devices as bait and faked network environments: With its ThreatDefend platform, Attivo Networks is ahead in the defense against cyber criminals. This is intended to quickly identify and contain threats, reduce the length of time attackers stay in the network and reduce the risk of large-scale damage.

The well-known cat-and-mouse game between security officers and cyber criminals: With increasing digitization, IT managers worldwide have to protect data from cyber attacks. Attackers are becoming ever more sophisticated and can often bypass firewalls, web gateways and antivirus software . Especially endpoint devices such as smartphones , notebooks and tablets have become popular destinations. Companies have to reposition themselves to ward off modern attacks. “Since the first antivirus and firewall have been around, the attackers have been leading and the defenders have been chasing. The entire IT security industry is responding and there is hardly any technology that works actively and makes the attackers sweat as it makes the defenders sweat, ”explains Joe Weidner, regional director of the DACH region at Attivo.

The Attivo ThreatDefend platform is based on deception technology, a technique that is based on misleading and deception. So far, this approach has been used by attackers themselves, for example to send incorrect registration links via phishing emails. “Deception technology interrupts an attacker’s behavior, using his own methods. The attacker initially believes he has all the time in the world to connect to a network to stop without being discovered. He does not expect that he has already found valuable data in our deception environment, ”explains Weidner. With the deception solution, Attivo attracts intruders, recognizes them early and collects information about their attack. From the information, a forensic report on IP addresses, target IP ports, time and other details of the attack is created. This new knowledge in turn results in continuous advances in security architectures.

Read the full article here.

No Comments

Post a Comment

four × one =