MITRE APT ATT&CK DIY Assessment Results: Endpoint Detection Rates Improved by an Average of 42%

Awards

SC 2020 Awards
Astors award platinum 2019

Why Customers choose EDN to strengthen their endpoint security posture

Enhance defensive strategies to quickly detect and deny lateral movement

Protecting endpoints and preventing the spread of infected systems is a critical concern for organizations of all sizes. The Attivo Endpoint Detection Net (EDN) product complements existing endpoint security solutions by detecting an attacker early in the attack cycle and preventing them from establishing a foothold. The EDN product tackles endpoint security challenges head-on by making every endpoint a decoy, designed to disrupt an attacker’s ability to break out and further infiltrate the network. It does this without requiring agents on the endpoint or causing disruption to regular network operations.

Comprehensive Endpoint Attack Vector Coverage

Detect even the mere act of observation

Detect even the mere act of observation

Endpoint Detection Net Portfolio

The Endpoint Detection Net solution is designed to anticipate methods an attacker will use to break out from an infected endpoint and ambush their every move. This unique approach to detection specifically focuses on reducing the time an attacker can remain undetected and the amount of effort required for an organization to restore environments to normal operations.

DATA CLOAKING
DataCloak

Hide and deny access to local files, folders, storage, and network or cloud shares

THREATSTRIKE
ThreatStrike

Detect attackers attempting steal credentials and move laterally

ADSECURE
ADSecure

Alert on unauthorized AD queries and return false information to attackers

Detect and disrupt attacker lateral movement and host discovery activity
Deflect

Detect and disrupt attacker lateral movement and host discovery activity

THREATPATH
ThreatPath

Identify exposed credentials and remove at risk attack paths

Key Benefits

The Attivo Endpoint Detection Net product is tackling endpoint security challenges head-on by making every endpoint a decoy designed to disrupt an attacker’s ability to break out and further infiltrate the network.

  • Early Detection of known and unknown attacks
  • Ability to disrupt attacks during observation vs. waiting for an active attack
  • Does not require agents on the endpoint or cause disruption to regular network operations
  • Scalability across a wide-variety of endpoints
  • Machine-learning for automated deployment
  • Capabilities to collect adversary intelligence and forensic data
  • Serve as a powerful protection force-multiplier for businesses using Endpoint Protection (EPP) and Endpoint Detection and Response (EDR) solutions by closing detection gaps and facilitating automated incident response
  • Improved detection proficiency during Red Team testing and security assessments

ENDPOINTS supported

AWS
Windows

USE CASES

  • Protection against AD data theft

    • — Prevent privilege escalation.


  • Local credential theft detection

    • — Deny access to local admin accounts and use deceptive credentials to breadcrumb attackers into a decoy environment


  • Ransomware derailment

    • — Obfuscate and deny access to production files, folders, removable storage, network drives, and cloud shares


  • Detect on network reconnaissance

    • — Obfuscate real assets with decoy systems, ports, and services to disrupt attacker attempts to identify other targets to compromise.


  • Reveal attempts to steal credentials in transit

    • — Quickly detect Man-in-the-Middle activity with decoys on every network segment.


  • Stop lateral movement before it starts

    • — Gain ongoing visibility to domain admin and other credentials that are exposed or where they don’t belong. Remediate lateral attack paths before attackers can use them.


  • Boost EPP/EDR detection

    • — Gain lateral movement detection performance by pairing endpoint security controls with EDN.  Enrich detections by identifying specific techniques.

Upon completion of a proof of concept…

“Look at all this visibility and coverage we achieved in just a few hours!  And, I didn’t have to deploy anything to the endpoint.”

Sr Security Engineer, Top 5 Global Consulting Firm