Support Login.

fifteen − 10 =

 

Resource Center

Welcome to the Attivo Resource Center. Here you will find resources to learn more about Attivo and Attivo threat detection solutions.

  • Categories

  • Format

Portfolio Overview

Insight into how deception technology works, Attivo Networks Deception and Response Platform, and how to detect in-network threats and accelerate incident response.

At-a-Glance

Brief look into how the Attivo Deception and Response Platform detects in-network threats and accelerates incident response.

Deception: Advantaged Reality for Detection and Defense

Senior Security Analyst at 451 Research discusses the capabilities derived from sophisticated deception platforms. These products adapt and convert attacker behavioral data into vital detection, intelligence, and offensive capabilities.

 

 

Introduction to Deception Technology

A brief introduction to deception technology and the Attivo Networks Deception and Response Platform.

Distributed Deception Platforms for Automating Incident Response

The Attivo Networks ThreatOps Solution enables accelerated incident response capabilities through numerous third-party integrations, automating attack data correlating, and incident response action.

Attivo Networks’ high-fidelity deception platform aims to fool attackers

The company’s deception technology and platform are seeing a significant rise in market profile in 2016. Attivo offers a high signal-to-noise approach to detection, verification, and attacker intelligence.

An Adaptive Cyber Security Threat Defense for Healthcare Organizations

The solution to alleviate the risk of a major breach of patient data is deception technology.

Point-of-Sale System Attacks

Researches the environment of POS device vulnerabilities, how POS attacks happen, the anatomy of a POS attack, and how deception plays a powerful role in protecting against cyber-attacks.

Survey Report: Need for Visibility and Efficiency Drives Rapid Shift to Detection

Survey reveals significant shift in security budgets from prevention devices to detection devices.

Integrating Attivo Networks and Carbon Black – BlackHat 2016

Attivo Networks CMO Carolyn Crandall speaks to the power of the integration between Attivo Networks and Carbon Black.

Deception as a Security Discipline for Advanced Threat Detection and Defense

Will the addition of deception deliver a bona fide return? We believe that deception delivers an effective and efficient defense and will share our rationale in this webinar.

Deception as a Security Discipline – Frost & Sullivan

Written by Michael Suby, Stratecast VP of Research, this report dives into deception as a solution to the most prevalent problems facing cyber security professionals. 

TAG – Distinguished Vendors

Attivo is also honored to be recognized within the report as a Distinguished Vendor for Intrusion Detection Systems.

TAG – Industry Luminary Interviews: Tushar Kothari

Attivo is also honored to be recognized within the report as a Distinguished Vendor for Intrusion Detection Systems.

TAG – Practical Handbook and Reference Guide for the Working Cyber Security Professional

Attivo is also honored to be recognized within the report as a Distinguished Vendor for Intrusion Detection Systems.

Introduction to Attivo Networks at AFCEA West 2017

Introduction to Attivo Networks and deception technology at AFCEA West 2017.

Interview With Tushar Kothari

SiliconANGLE interviews Attivo Networks CEO Tushar Kothari at Juniper Networks NXTWORK 2015.

Introduction to Attivo Networks – RSA 2016

Attivo Networks CMO Carolyn Crandall Introduces Attivo at RSA 2016

SC Magazine Review

“It is, really, a high interaction honeypot on steroids”

Aflac, Inc. Uses Deception for Zero-False-Positives Threat Detection

DJ Goldsworthy, Threat Manager at Aflac, Inc., speaks to the power of deception technology

Aflac, Inc. Uses Deception for Zero-False-Positives Threat Detection

Aflac, Inc. uses deception to stay one step ahead of cyber attackers

The Art of Deception: Todd Holloway Marvell Semiconductor

Todd Holloway of Marvell Semiconductor discusses the Assumed Breach Posture

Attivo Networks Deception Platform for Forensics and Incident Response

Regional healthcare organization inoculates their network against aggressive Qakbot malware

Deception Technology Derails Ransomware Attack on Regional Healthcare Provider

Regional healthcare organization successfully stops the spread of a ransomware attack in their network

Financial Institution Thwarts Penetration Test with Deception

Financial institution uses deception to pass penetration test they failed with other security devices

Major Entertainment Organization Deploys Deception for Insider Threat Visibility

Major entertainment company protects intellectual property from insider and stolen credential attacks

Major Sports Organization Protects Critical Infrastructure With Deception Technology

Major sports organization detects and diverts attack during a live event

Manufacturer Protects Intellectual Property with the Attivo Deception Platform

Semiconductor company uses deception to add visibility into subnets that house their most critical data

Securing Patient Data When Prevention Systems Have Failed with Daniel from Mission Health

InfoSec Professional explains how he used deception technology to stop the aggressive spread of Qakbot

Semiconductor Company Implements Deception to Stop Man-in-the-Middle Attacks

Semiconductor manufacturer adopts deception for real-time Man-in-the-Middle detection

The Attivo BOTsink Platform Integrates with the Blue Coat ProxySG

Attivo Networks integrates with Blue Coat ProxySG

Attivo Networks and Carbon Black Security Platform Integration

Attivo Networks integrates with Carbon Black Security Platform

Attivo Networks and Palo Alto Networks

Attivo Networks integrates with Palo Alto Networks Next-Generation Firewall

Attivo Networks Deception Platform Integrates with Cisco pxGrid Simplifying Detection and Incident Response

Attivo Networks integrates with Cisco pxGris

Attivo Networks Deception Platform Integration with Forescout CounterACT®

Attivo Networks integrates with Forescout CounterACT®

Attivo Networks Deception Platform and McAfee NSP Integration DNS Sinkhole with URL Sandboxing

Attivo Networks integrates with McAfee DNS sinkhole

Attivo Networks Deception Platform Integrates with the Check Point Management Server

Attivo Networks integrates with Check Point Management Server

Detect Infected Machines and Stop Data Exfiltration with Attivo Deception Platform and Juniper SRX Firewalls

Attivo Networks integrates with Juniper SRX Firewalls

Partner Integrations for Adaptive and Continuous Threat Management

Deception technology in the cyber security eco-system

Checklist for Evaluating Deception Platforms

What deception technology is and how it provides an effective solution for detecting in-network threats in real-time.

How to Evaluate Deception Platforms and Checklist

An in-depth answer to the questions surrounding deception technology

Deception for Attack Detection of IoT Devices

This document will address the security concerns with the latest in security for connected devices—deception technology.

Defense in Depth in the Amazon Web Servcies Cloud

The security challenges within AWS environments and creating a defense in depth using deception technology.

Enhancing AWS Cloud Security with Deception Technology

How to get real-time visibility inside the data center on a shared security model.

Dynamic Deception for Industrial Control Systems

How deception-based threat detection helps energy facilities dramatically increase the speed threats are uncovered.

Injecting Real-time Cyber Attack Detection into SCADA Networks

Learn about defense in-depth for SCADA networks and closing the gaps left by current security infrastructure solutions.

Harnessing Unparalleled Visibility in Cyber Attack Investigations

Demo of advanced forensic analysis, reporting, and how prevention system integrations expedite remediation.

Know What is Lurking in Your Network

Find out how deception technology allows for in-network detection of advanced threats.

What’s Lurking Deep in Your Network

Advanced techniques for finding malware lurking in corporate domains, remote offices, data centers, and in the cloud.

Leveraging Deception for Visibility

Addresses the different threat vectors affecting organizations and real use cases for in-network threat detection with deception.

Pre-emptive Spear Phishing Management

Learn why phishing is one of the top cyber attacks occurring, how it works, and the steps an organization can take to protect their employees.

The Role of Dynamic Deception in the Cyber Kill Chain

Learn about the challenges of today’s threat landscape and the opportunities to address holes in the cyber attack lifecycle.

How to Avoid Common Healthcare data Security Challenges

How Healthcare Companies can avoid common security challenges by not relying on just HIPAA compliance for data security.

Dear Locky: You have shown that signature-based detection is fundamentally impossible, but we still caught you!

Deception technology: catching the uncatchable

Deception Technology Comes of Age

What does it mean to be more than just a honey pot?

Does Hillary, Bernie, Donald, or You Hold the Greatest Risk for being a Cyberattack Victim this Election Season

Deception as a solution to IoT security gaps

Healthcare Industry Under Attack… Nasty Strain of Malware Resurfaces and Challenges Security Operations Team with

What healthcare security operations teams can do to better defend their companies

Information Security: A Corporate Responsibility that goes beyond the CISO

Going beyond the CISO

Legal Settlements Could Place More Urgency On Healthcare Security

The cost of poor healthcare security might have just gotten more expensive.

National Health IT Week, Don’t Forget to Focus on Cyber Security

How can the most targeted industry protect themselves from cyber threats?

New Attacks Highlight Need for a New Approach to Cyber Protection

Are current prevention techniques enough to stop modern cyber threats?

Our Critical Infrastructure Safety, a Cautionary Tale

Is the U.S. prepared for a major cyber attack on critical infrastructure?

Ransomware… Because That’s Where the Money Is

As more cyber criminals flock to “where the money is”, how will you protect yourself?

Smart City Transport Needs Smart Cyber Security Strategies: IoT

As connectivity increases, how can we be sure that these devices are secure?

Uncertainty as a Goal of Deception in Cyber Security

“Enterprise cyber security teams must begin accelerating the use of deception in their infrastructure”

What Brexit Means for the Cyber Security Industry

Brexit: Contributor to the shrinking cyber security labor pool?


Portfolio Overview

Insight into how deception technology works, Attivo Networks Deception and Response Platform, and how to detect in-network threats and accelerate incident response.

At-a-Glance

Brief look into how the Attivo Deception and Response Platform detects in-network threats and accelerates incident response.

Deception: Advantaged Reality for Detection and Defense

Senior Security Analyst at 451 Research discusses the capabilities derived from sophisticated deception platforms. These products adapt and convert attacker behavioral data into vital detection, intelligence, and offensive capabilities.

 

 

Introduction to Deception Technology

A brief introduction to deception technology and the Attivo Networks Deception and Response Platform.

Distributed Deception Platforms for Automating Incident Response

The Attivo Networks ThreatOps Solution enables accelerated incident response capabilities through numerous third-party integrations, automating attack data correlating, and incident response action.

Attivo Networks’ high-fidelity deception platform aims to fool attackers

The company’s deception technology and platform are seeing a significant rise in market profile in 2016. Attivo offers a high signal-to-noise approach to detection, verification, and attacker intelligence.

An Adaptive Cyber Security Threat Defense for Healthcare Organizations

The solution to alleviate the risk of a major breach of patient data is deception technology.

Point-of-Sale System Attacks

Researches the environment of POS device vulnerabilities, how POS attacks happen, the anatomy of a POS attack, and how deception plays a powerful role in protecting against cyber-attacks.

Survey Report: Need for Visibility and Efficiency Drives Rapid Shift to Detection

Survey reveals significant shift in security budgets from prevention devices to detection devices.

Integrating Attivo Networks and Carbon Black – BlackHat 2016

Attivo Networks CMO Carolyn Crandall speaks to the power of the integration between Attivo Networks and Carbon Black.

Deception as a Security Discipline for Advanced Threat Detection and Defense

Will the addition of deception deliver a bona fide return? We believe that deception delivers an effective and efficient defense and will share our rationale in this webinar.

Deception as a Security Discipline – Frost & Sullivan

Written by Michael Suby, Stratecast VP of Research, this report dives into deception as a solution to the most prevalent problems facing cyber security professionals. 

TAG – Distinguished Vendors

Attivo is also honored to be recognized within the report as a Distinguished Vendor for Intrusion Detection Systems.

TAG – Industry Luminary Interviews: Tushar Kothari

Attivo is also honored to be recognized within the report as a Distinguished Vendor for Intrusion Detection Systems.

TAG – Practical Handbook and Reference Guide for the Working Cyber Security Professional

Attivo is also honored to be recognized within the report as a Distinguished Vendor for Intrusion Detection Systems.

Introduction to Attivo Networks at AFCEA West 2017

Introduction to Attivo Networks and deception technology at AFCEA West 2017.

Interview With Tushar Kothari

SiliconANGLE interviews Attivo Networks CEO Tushar Kothari at Juniper Networks NXTWORK 2015.

Introduction to Attivo Networks – RSA 2016

Attivo Networks CMO Carolyn Crandall Introduces Attivo at RSA 2016

SC Magazine Review

“It is, really, a high interaction honeypot on steroids”

Aflac, Inc. Uses Deception for Zero-False-Positives Threat Detection

DJ Goldsworthy, Threat Manager at Aflac, Inc., speaks to the power of deception technology

Aflac, Inc. Uses Deception for Zero-False-Positives Threat Detection

Aflac, Inc. uses deception to stay one step ahead of cyber attackers

The Art of Deception: Todd Holloway Marvell Semiconductor

Todd Holloway of Marvell Semiconductor discusses the Assumed Breach Posture

Attivo Networks Deception Platform for Forensics and Incident Response

Regional healthcare organization inoculates their network against aggressive Qakbot malware

Deception Technology Derails Ransomware Attack on Regional Healthcare Provider

Regional healthcare organization successfully stops the spread of a ransomware attack in their network

Financial Institution Thwarts Penetration Test with Deception

Financial institution uses deception to pass penetration test they failed with other security devices

Major Entertainment Organization Deploys Deception for Insider Threat Visibility

Major entertainment company protects intellectual property from insider and stolen credential attacks

Major Sports Organization Protects Critical Infrastructure With Deception Technology

Major sports organization detects and diverts attack during a live event

Manufacturer Protects Intellectual Property with the Attivo Deception Platform

Semiconductor company uses deception to add visibility into subnets that house their most critical data

Securing Patient Data When Prevention Systems Have Failed with Daniel from Mission Health

InfoSec Professional explains how he used deception technology to stop the aggressive spread of Qakbot

Semiconductor Company Implements Deception to Stop Man-in-the-Middle Attacks

Semiconductor manufacturer adopts deception for real-time Man-in-the-Middle detection

The Attivo BOTsink Platform Integrates with the Blue Coat ProxySG

Attivo Networks integrates with Blue Coat ProxySG

Attivo Networks and Carbon Black Security Platform Integration

Attivo Networks integrates with Carbon Black Security Platform

Attivo Networks and Palo Alto Networks

Attivo Networks integrates with Palo Alto Networks Next-Generation Firewall

Attivo Networks Deception Platform Integrates with Cisco pxGrid Simplifying Detection and Incident Response

Attivo Networks integrates with Cisco pxGris

Attivo Networks Deception Platform Integration with Forescout CounterACT®

Attivo Networks integrates with Forescout CounterACT®

Attivo Networks Deception Platform and McAfee NSP Integration DNS Sinkhole with URL Sandboxing

Attivo Networks integrates with McAfee DNS sinkhole

Attivo Networks Deception Platform Integrates with the Check Point Management Server

Attivo Networks integrates with Check Point Management Server

Detect Infected Machines and Stop Data Exfiltration with Attivo Deception Platform and Juniper SRX Firewalls

Attivo Networks integrates with Juniper SRX Firewalls

Partner Integrations for Adaptive and Continuous Threat Management

Deception technology in the cyber security eco-system

Checklist for Evaluating Deception Platforms

What deception technology is and how it provides an effective solution for detecting in-network threats in real-time.

How to Evaluate Deception Platforms and Checklist

An in-depth answer to the questions surrounding deception technology

Deception for Attack Detection of IoT Devices

This document will address the security concerns with the latest in security for connected devices—deception technology.

Defense in Depth in the Amazon Web Servcies Cloud

The security challenges within AWS environments and creating a defense in depth using deception technology.

Enhancing AWS Cloud Security with Deception Technology

How to get real-time visibility inside the data center on a shared security model.

Dynamic Deception for Industrial Control Systems

How deception-based threat detection helps energy facilities dramatically increase the speed threats are uncovered.

Injecting Real-time Cyber Attack Detection into SCADA Networks

Learn about defense in-depth for SCADA networks and closing the gaps left by current security infrastructure solutions.

Harnessing Unparalleled Visibility in Cyber Attack Investigations

Demo of advanced forensic analysis, reporting, and how prevention system integrations expedite remediation.

Know What is Lurking in Your Network

Find out how deception technology allows for in-network detection of advanced threats.

What’s Lurking Deep in Your Network

Advanced techniques for finding malware lurking in corporate domains, remote offices, data centers, and in the cloud.

Leveraging Deception for Visibility

Addresses the different threat vectors affecting organizations and real use cases for in-network threat detection with deception.

Pre-emptive Spear Phishing Management

Learn why phishing is one of the top cyber attacks occurring, how it works, and the steps an organization can take to protect their employees.

The Role of Dynamic Deception in the Cyber Kill Chain

Learn about the challenges of today’s threat landscape and the opportunities to address holes in the cyber attack lifecycle.

How to Avoid Common Healthcare data Security Challenges

How Healthcare Companies can avoid common security challenges by not relying on just HIPAA compliance for data security.

Dear Locky: You have shown that signature-based detection is fundamentally impossible, but we still caught you!

Deception technology: catching the uncatchable

Deception Technology Comes of Age

What does it mean to be more than just a honey pot?

Does Hillary, Bernie, Donald, or You Hold the Greatest Risk for being a Cyberattack Victim this Election Season

Deception as a solution to IoT security gaps

Healthcare Industry Under Attack… Nasty Strain of Malware Resurfaces and Challenges Security Operations Team with

What healthcare security operations teams can do to better defend their companies

Information Security: A Corporate Responsibility that goes beyond the CISO

Going beyond the CISO

Legal Settlements Could Place More Urgency On Healthcare Security

The cost of poor healthcare security might have just gotten more expensive.

National Health IT Week, Don’t Forget to Focus on Cyber Security

How can the most targeted industry protect themselves from cyber threats?

New Attacks Highlight Need for a New Approach to Cyber Protection

Are current prevention techniques enough to stop modern cyber threats?

Our Critical Infrastructure Safety, a Cautionary Tale

Is the U.S. prepared for a major cyber attack on critical infrastructure?

Ransomware… Because That’s Where the Money Is

As more cyber criminals flock to “where the money is”, how will you protect yourself?

Smart City Transport Needs Smart Cyber Security Strategies: IoT

As connectivity increases, how can we be sure that these devices are secure?

Uncertainty as a Goal of Deception in Cyber Security

“Enterprise cyber security teams must begin accelerating the use of deception in their infrastructure”

What Brexit Means for the Cyber Security Industry

Brexit: Contributor to the shrinking cyber security labor pool?