Tune in with Fernando Montenegro, Analyst at 451 Research, and Carolyn Crandall, Chief Deception Officer, and CMO at Attivo Networks, for an engaging discussion on the latest Endpoint Security research, challenges organizations are facing today, and why deception technology has created a winning strategy for locking down the endpoint
Endpoints are the primary target of attackers, with research sharing that, on average, attackers can compromise them in under 5 hours and can break out (move to another system) in under 4.5 hours. Today, the stakes are higher than ever. With the rapid decentralization and proliferation of connected devices, endpoints are the new battleground. Antivirus is foundational, and EDR solutions add valuable improvements. However, even with these controls, attackers have demonstrated that they can successfully bypass them, and once they have, are extremely difficult to detect. Locking down the endpoint from lateral movement would massively valuable in reducing risk. So, is it really possible to lock down the endpoint? Can this same technology go so far as derailing even the act of active observation?