Attivo Networks Blogs

Blogs

Attivo Networks Saw Strong Interest at the OpenStack Summit in Attack Detection Solutions as Organizations Seek to Secure OpenStack Production Environments    

Reading Time: 3 minutes  |  Published: May 6, 2016 in Attivo (Company), Blogs, Deception, Threat Detection
0 Comments

Recently, Attivo participated the OpenStack Summit in Austin, Texas, where the company showcased its industry-leading, inside-the-network threat detection and forensic analysis technology. Highlighting customer use cases, Attivo demonstrated how its technology could enhance an organization’s current security infrastructure and provide valuable contributions to an...

Attivo Networks Partners with Blue Coat to Improve Incident Response Time

Reading Time: 3 minutes  |  Published: April 29, 2016 in Attivo (Company), Blogs, Partner, Threat Detection
0 Comments

When threat actors are able to stealthily penetrate an organizations defenses, the promptness of detection is critical to protecting critical information assets. The sooner that one can detect an inside-the-network threat, the easier it is to mitigate the damage from threats that have bypassed prevention...

Attivo Networks Hits the Road for Starlink’s Middle East Roadshow

Reading Time: 2 minutes  |  Published: April 22, 2016 in Attivo (Company), Blogs, Deception, Partner, Threat Detection
0 Comments

By Carolyn Crandall, CMO Following close on the heels of Attivo’s opening a Middle East office, the company is participating with our new value-added distributor partner Starlink on its ambitious sixth annual Starlink IT Security Roadshow, which is covering eight locations in 21 days throughout the...

How to Evaluate Deception Platforms and Checklist

Reading Time: 6 minutes  |  Published: April 4, 2016 in Deception, Threat Detection, Threat Intelligence
0 Comments

By: Carolyn Crandall, CMO, Attivo Networks With over 700 reported breaches occurring annually, a modern day adaptive security approach requires a combination of prevention and detection technologies. Even the most state of the art prevention solutions cannot keep every attacker out. Being able to promptly detect threats...

Dear Locky: You have shown that signature-based detection is fundamentally impossible, but we still caught you!

Reading Time: 4 minutes  |  Published: March 17, 2016 in Blogs, Cyber Breach, Threat Detection, Uncategorized
0 Comments

By: Carolyn Crandall CMO The Dridex Locky ransomware strain by design isn’t any more sophisticated than its fellow ransomware Cryptowall, TeslaCrypt and others. However, it is said to be backed by the Russian Dridex criminal group, a known leader in banking malware and it has quickly...

RSA 2016 Ends, But for Attivo It is Just the Beginning

Reading Time: 3 minutes  |  Published: March 10, 2016 in Attivo (Company), Blogs, Deception, Threat Detection
0 Comments

Deception technology was a major topic at last week’s RSA conference in San Francisco. With the recent onslaught of malware, attendees were eager to learn more about new approaches to inside-the-network detection and how deception technology could fit into their current security infrastructure strategy. As...