MITRE APT ATT&CK® DIY Assessment Results: Endpoint Detection Rates Improved by an Average of 42%

Why Customers Choose EDN to Strengthen Their Endpoint Security Posture

Enhance Defensive Strategies to Quickly Detect and Deny Lateral Movement

Protecting endpoints and preventing the spread of infected systems is a critical concern for organizations of all sizes. The Attivo Endpoint Detection Net (EDN) product complements existing endpoint security solutions by detecting an attacker early in the attack cycle, preventing them from stealing credentials and establishing a foothold. The EDN product tackles endpoint security challenges head-on by making every endpoint a decoy, designed to disrupt an attacker’s ability to break out and further infiltrate the network.

Upon completion of a proof of concept exercise…

“Very rarely do you see technology that is both very easy to use and quick time to value – usually if you have one you do not have the other.  Attivo was that unicorn technology where it was very easy to deploy and use.  We were receiving value a few hours into the POC.”

CISO, Fortune 500 Financial Services Firm

Awards For Endpoint Detection Net (EDN) Suite

SC 2020 Awards
Astors award platinum 2019

BENEFITS

The Attivo EDN Suite is tackling endpoint security challenges head-on by making every endpoint a decoy designed to disrupt an attacker’s ability to break out and further infiltrate the network.

  • Detects known and unknown attacks early in the attack cycle
  • Disrupts attacks during observation vs. waiting for an active attack
  • Requires no agents on the endpoint nor disrupts regular network operations
  • Scalability across a wide-variety of endpoints
  • Collects adversary intelligence and forensic data
  • Blocks real credential theft without attacker knowledge
  • Serves as a powerful protection force-multiplier for businesses using EPP and EDR solutions by closing detection gaps and facilitating automated incident response
  • Improves detection proficiency during Red Team testing and security assessments

Comprehensive Endpoint Attack Vector Coverage

Detect even the mere act of observation

Endpoint Attack

Endpoint Detection Net Portfolio

The Endpoint Detection Net solution is designed to anticipate methods an attacker will use to break out from an infected endpoint and ambush their every move. This unique approach to detection specifically focuses on reducing the time an attacker can remain undetected and the amount of effort required for an organization to restore environments to normal operations.

DATA CLOAKING
DataCloak

Hide & deny access to local files, folders, storage, & network/ cloud shares

THREATSTRIKE
ThreatStrike

Hide, bind & cloak credentials to deny unauthorized access & collect intel

ADSECURE
ADSecure

Alert on unauthorized AD queries and return false information to attackers

Detect and disrupt attacker lateral movement and host discovery activity
Deflect

Detect and disrupt attacker lateral movement and host discovery activity

THREATPATH
ThreatPath

Identify exposed credentials and remove at risk attack paths

ENDPOINTS supported

AWS
Windows

USE CASES

  • Protection against AD data theft

    • — Prevent privilege escalation.


  • Credential theft detection and prevention

    • — Hide and deny access to credentials and use deceptive credentials to breadcrumb attackers into a decoy environment for threat intelligence gathering


  • Ransomware derailment

    • — Obfuscate and deny access to production files, folders, removable storage, network drives, and cloud shares


  • Detect on network reconnaissance

    • — Obfuscate real assets with decoy systems, ports, and services to disrupt attacker attempts to identify other targets to compromise.


  • Reveal attempts to steal credentials in transit

    • — Quickly detect Man-in-the-Middle activity with decoys on every network segment.


  • Stop lateral movement before it starts

    • — Gain ongoing visibility to domain admin and other credentials that are exposed or where they don’t belong. Remediate lateral attack paths before attackers can use them.


  • Boost EPP/EDR detection

    • — Gain lateral movement detection performance by pairing endpoint security controls with EDN.  Enrich detections by identifying specific techniques.