• Categories

  • Format

Cost Savings of Deception Quantified

Watch this webinar with Kevin Fiscus of Deceptive Defense, Inc. and Carolyn Crandall the Chief Deception Officer and CMO of Attivo Networks where Kevin shares his research findings on the cost savings associated with deception technology.

Mapping Your Active Defense Capabilites to MITRE Shield

Join Edward Amoroso, CEO of TAG Cyber, and Tushar Kothari, CEO of Attivo Networks for a technical discussion on how Attivo Networks solutions address the MITRE Shield tactics and techniques to maximize detection coverage, deliver insights into what tools attackers are using, identify their activities, and gather intelligence into what adversaries are seeking.

Calculating ROI for Attivo Deception and Concealment Technology

Cybersecurity professionals understand the value of deception technology. Unfortunately, while they may have input when determining the merits of security solutions to purchase, they do not often have the authority to influence budgets, which means that they must find a way to financially justify a new security technology to the CFO and others. How can they clearly explain the value?

Beers & Bytes Episode 11 Tony Cole Deception Technology Expert

Tony Cole, Attivo Networks CTO, candidly discusses their offensive play with deception. Tune in to hear about integrations (they have 32 integrations now), how they’ve gotten to owning over 60% of the market, free 30-day trials of their most in-demand products. The SMB market can also utilize Attivo Networks at a low-cost point. If you have EDR you need EDN to fill in the gaps. Hear more now.

Attivo Networks® ThreatDefend® Platform and the Mitre ATT&CK® Matrix For Cloud

The Attivo Networks ThreatDefend® platform provides extensive capabilities to detect many of the techniques and sub-techniques outlined in the ATT&CK Matrix for Cloud.

Enhancing OT Deception with Model Driven, High Fidelity Decoys

This webinar presents the capabilities developed by the Pacific Northwest National Laboratory and Attivo Networks collaboration under the Department of Energy Technology Commercialization Fund program to create enhanced deceptions for defense of critical infrastructure OT systems.

Attivo Networks ThreatPath Cyber Hygiene & Attack Surface Reduction

The Attivo ThreatPath® solution, part of the modular ThreatDefend Endpoint Detection Net family of products, provides continuous attack surface monitoring, reduces attack paths, and improves organizations’ cyber hygiene.

Attivo Networks Named a 2021 TAG Cyber Distinguished Vendor

Attivo Networks is honored to be recognized for the fifth year in a row as a Distinguished Vendor. Additional information and an interview with CEO Tushar Kothari can be found starting on page 92.

Deception Defense Platform for Cyber-Physical Systems

There is an ever-increasing number of cyber-attacks targeted at cyber-physical systems vital to the operation of our critical infrastructure. Everything from disruption, destruction, data loss, or general rampant internet threats have become a risk to cyber-physical systems that were once thought isolated and secure from cyber threats.

In Security News – Deception ROI

Kevin Fiscus, Founder of Deceptive Defense shares his research findings on the cost savings associated with deception technology.

DataCloak, Innovations For Hiding Data and Denying Access to Attackers

The Attivo concealment, DataCloak framework, works hand-in-hand with a layered defense strategy and prevents attackers from being able to discover the data they are seeking

Attivo Deception MITRE Shield Mapping

Attivo evaluated its ThreatDefend® Platform capabilities against all Active Defense techniques and use cases documented per technique in the MITRE Shield knowledge base. Download this paper to learn how the ThreatDefend components provide the building blocks needed for an Active Defense strategy.

Cyber Deception Significantly Reduces Data Breach Costs & Improves SOC Efficiency

The combination of detecting attacks early, reducing the cost of a data breach by an over 60%, and improving SOC efficiencies by 32% can result in significant savings for organizations both large and small. When paired with the ability to boost EDR detection rates by over 42%, according to testing with the MITRE ATT&CK® framework DIY tool, this can be a powerful security control to add to every defender’s arsenal.

In-Security Update: ADSecure

Tune in with Carolyn Crandall, CMO and Chief Deception Officer and Tony Cole, CTO as they discuss the state of Active Directory protection and how to leverage the Attivo Networks ADSecure solution to gain visibility to AD attacks, privilege escalation attempts, and attacker lateral movement – all without altering or interfering with production Domain Controllers.

Adversaries in the Wire – Stopping In-Network Threats

Watch this on-demand session to learn how Deception Technology Detects credential theft and unauthorized AD queries, Disrupts host fingerprinting and service discovery, Deflects lateral movement activity, and Detects and alerts on attackers early in the attack cycle.

Hunting Threats with FireEye and Attivo Networks

Watch this session to learn how: The ThreatDefend platform detects advanced attackers with speed and accuracy, the joint solution captures and analyzes advanced malware threats,  accelerates incident response with automated blocking of infected systems, and collects forensics, and develops company-centric threat intelligence.

Hide and Deny Access to Ransomware Attackers

Get unique insights into the most modern ransomware attack tactics and how the Attivo ThreatDefend solution is used to achieve early detection of cyber-attackers. New Endpoint Detection Net (EDN) capabilities will be shared along with how they prevent attackers from moving laterally, escalating privileges, and finding and accessing the files, folders, mapped network, and cloud shares they seek to tamper with.

Attivo Networks Customer and Analyst Quotes

Due to the confidential nature of our technology, many of our customers have requested that we not attribute their names or companies to their quotes, as to not tip off adversaries or insider threats that deception technology is deployed in their environment. As a result, we have anonymized all customer quotes and marked each one with the customer’s job title, business vertical, and/or company size.

Deflect Attacks with the Endpoint Detection Net Suite

The EDN Deflect function brings a needed capability to make every endpoint a part of the deception fabric. By denying attackers the ability to collect accurate information on their targets and disrupt their ability to move laterally undetected, the Deflect function gives organizations an early warning and an active defense against malicious East/ West traffic to increase their security posture and catch attackers early in the attack cycle.

Scaling Detection with the ThreatDirect Solution

It is critical to have visibility across the entire network with no gaps based on location or resource limitations. With the ThreatDirect solution, organizations can now scale their adaptive defense across remote areas of their network with full-featured deception-based detection, automated attack analysis, and accelerated incident response capabilities.

Ransomware Mitigation

The Attivo Networks Endpoint Detection Net (EDN) ransomware mitigation functions arm security teams with the defense they need to detect and derail both common and advanced ransomware attacks quickly.

EDN Datasheet

By adding the EDN suite to existing EPP and EDR solutions, organizations can strengthen their endpoint defenses and deny attackers a foothold into the network.

Federal News Network Executive Briefing: Cybersecurity Strategies

Federal News Network and Attivo Networks asked a panel of federal cybersecurity practitioners for a read on the most contemporary cybersecurity thinking. Read on to learn more.

CDM Webinar: Game Changing Breach Defense by Dramatically Improving Endpoint Security

Hear from Attivo Networks CTO, Tony Cole, in this discussion on how to better protect your endpoints and prevent attackers from moving laterally across your enterprise.

Using a Commercial Deception Solution to Improve MITRE ATT&CK Test Results for Endpoint Security

Dr. Edward Amoroso, CEO of TAG Cyber, outlines the results of a recent round of MITRE ATT&CK testing performed for four top endpoint security tools. Find out how the performance and detection of these tools improves by an average 42% when used in conjunction with Attivo Networks EDN suite.

MITRE ATTACK: Augmenting Endpoint Defenses with the Attivo Networks® EDN Solution

Thanks to the MITRE Corporation’s ATT&CK matrix product evaluations, Attivo Networks now has data clearly demonstrating that its EDN suite improves endpoint security by augmenting existing endpoint security controls to boost overall detection performance. Learn more.

Better Endpoint Defense with CrowdStrike and Attivo Networks

Watch this on-demand webinar to learn about the integration between the Attivo Networks ThreatDefend® platform and the CrowdStrike Falcon Insight EDR solution that combines accurate in-network detection with automated response actions to isolate attackers and empower organizations to respond quickly to attackers already inside the network.

9 Notable 2020 CISO Challenges – Are they the Same as Yours?

The world has changed in so many ways in 2020. Even with the best-laid plans and precautions, CISOs have had to quickly respond to the COVID-19 pandemic, revising strategies and transitioning from unprepared to prepared. Read on for a list of important things CISOs are tackling as they look to stay one step ahead in these rapidly changing times.

Customer Experiences in Real World Deception Deployments

Hear from Sarah Ashburn, SVP of Sales and Customer Success & Robert Crisp, VP of Field Technical Operations, on the real-world detection alerts from Attivo Networks customers and the information collected in those alerts.

SINC Report: The Cybersecurity Landscape: Challenges & How to Overcome Them

This study measured the state of cybersecurity today in the United States. SINC contacted companies with 1,000+ employees, with over $25 million in annual sales. The title levels of respondents included: CISO, CIO, Cybersecurity Director, Security Risk Officer/Manager, Directory of Security, and VP of Security.

Behind the Scenes with Attivo Networks

Go behind the scenes with CEO, Tushar Kothari, CTO, Tony Cole, and CMO & Chief Deception Officer, Carolyn Crandall as they discuss the state of cybersecurity, the value of deception-based threat detection, and more.

Attivo Networks ThreatDefend Platform SIEM Integrations

The rapid pace of attacks, existing security challenges such as staff shortages, and the ever-increasing alert volume drive the security industry to embrace the notion of consolidating data resources and orchestrating actions across vendors, open-source projects, and internal development efforts. Read on to learn more about our SIEM integrations.

Customer Experiences in Real-World Deception Deployments

In this webinar, you will have the unique opportunity to hear from three behind-the-mask security practitioners who are actively using Attivo Networks deception technology in very different environments.

NIST is Doubling Down on Deception and You Should Be Too

Todd Helfrich, VP of Federal Sales & Tony Cole, CTO at Attivo Networks sit down to discuss the relationship between the NIST framework and the Attivo Networks deception-based threat detection solution.

Reducing EDR Cyber Risk with Deception

Hear from Tushar Kothari, CEO of Attivo Networks and Edward Amoroso, CEO of TAG Cyber in this technical discussion of how deception can be used to dramatically reduce cyber risks to modern endpoints.

NIST: 800-160(2) and 800-171(B) Securing High Value Assets and Confidential Unclassified Information

This paper will very briefly summarize these NIST publications, introduce deception technology, and show how deception technology fits within the NIST guidelines to support regulatory compliance and enhanced security.

Optimizing Endpoint Protection

Prevent attackers from breaking out from an infected system by restricting their ability to move laterally or conduct reconnaissance.

Attivo Networks Brand Guidelines

This guide informs Attivo Networks Partners and design agencies on the appropriate implementation of Attivo Networks logos, partner badges, fonts, color, terminology, and design elements for materials commonly used in advertising, marketing, and demand generating activities.

Attivo Networks Cyber Word Search

Print out this cybersecurity-focused, family-friendly word-search and race to see who can complete it first, you or your kids? In the end, we have included some useful tips to share with your young ones about how to stay safe online during this time. Have fun!

Integrating Deception with DevOps

Organizations can deploy deception across the DevOps cycle to get insights into attacker activity and alert on any misconfigurations. Learn more about how Deception complements existing DevSecOps security controls in this white paper.

Deception Technology Use Cases to Defeat Advanced Attackers

Check out this use case document to find out how to strategically use deception technology to defeat even the most advanced threat actors.

How To Reduce Remote Worker VPN Risk

Watch this webinar to hear how deception-based threat detection solutions are adding a safety net of early and accurate threat detection for VPN environments.

Endpoint Detection Net Suite Use Case

It is critical for organizations to protect their endpoints and prevent attackers from spreading throughout the network. Most will use various forms of EPP and EDR solutions to defend endpoints from attacks. The Attivo Networks® Endpoint Detection Net (EDN) suite provides capabilities that complement these existing endpoint security solutions.

Detecting the Deceivers through Deception

In this session we discuss deception tactics that defenders can use on adversaries to gain fast and high-fidelity detection across an enterprise. Hear why this defensive fight is relevant to companies large and small, regardless of security capability maturity.

2019 Top Threat Detection Trends Survey

Throughout 2019, Attivo Networks conducted worldwide research to capture top trends related to cybersecurity threat detection. The company surveyed 1,249 security professionals with participants in North America, LATAM, Europe, and Australia, representing predominantly midsize and large firms across 15 different industry sectors.

How Deception is Shaping our Future

How are we using deception, and where could we be more effective, including a look towards the future of this technology and where/how to apply it.

 

Deception & Active Defense for Election Security

This talk covers where deception technologies are today, the future of deception for cyber defense, and is delivered by Chief Security Strategist Chris Roberts.

Securing The Enterprise When Employees Work Remotely

For various reasons, many companies are encouraging or being requiring to have employees to work from home. This shift in employees working in a less secure environment creates a significant opportunity for cybercriminals and reduces their time to compromise.

Defending Against Credential-Based Attacks – Protecting the Keys to the Front Door

To protect against credential-based attacks, organizations have implemented solutions such as Multifactor Authentication or Privileged Access Management that seek to curtail unauthorized access. However, these solutions still have gaps that an organization can bridge with Deception Technology.

Deception Technology in 2020 – ISMG Interview

Deception technology has moved from being an emerging technology to a more mainstream security control, say Tony Cole, CTO, and Carolyn Crandall, chief deception officer and chief marketing officer, at Attivo Networks.

ADSecure Datasheet

Read on for how the ADSecure solution, that is part of the Attivo Networks ThreatDefend™ Detection Platform, is providing a new approach to preventing cyber criminals for successfully reaching and compromising AD.

EDN Solution Brief

How Attivo Networks Endpoint Detection Net covers these gaps and acts as a force multiplier to Endpoint Protection Platforms and Endpoint Detection and Response solutions to truly lock down the environment, strengthening defenses to ambush attackers at the endpoint.

RSA 2020 – Endpoint Detection Net

Recording from Broadcast Ally at RSA 2020, Carolyn Crandall and Tony Cole sit down to discuss Attivo Networks’ newest product announcement: Endpoint Detection Net, which tackles endpoint security challenges head-on by making every endpoint a decoy designed to disrupt an attacker’s ability to break out and further infiltrate the network.

RSA 2020 – Attivo Networks Deception-Based Threat Detection

Recording from Broadcast Ally at RSA 2020, Carolyn Crandall and Tony Cole sit down to discuss Attivo Networks deception technology and all that it offers.

HardenStance Briefing – Telcos Invest in Fake Infrastructure

Attivo Networks cites a large North American telco as a customer that has derived tangible information security gains from using its ThreatDefend Deception Platform. Deception technology serves an important role in helping close the loop in cyber security across threat protection, detection and mitigation phases.

Manufacturer Protects Intellectual Property with the Attivo Deception Platform

Semiconductor company uses deception to add visibility into subnets that house their most critical data

Major Sports Organization Protects Critical Infrastructure With Deception Technology

Major sports organization detects and diverts attack during a live event

Large Retailer uses Deception for Active Acquisition Strategy

Large retailer uses deception technology to maintain network integrity in an active acquisition strategy.

Deception Technology Derails Ransomware Attack on Regional Healthcare Provider

Regional healthcare organization successfully stops the spread of a ransomware attack in their network

Major Entertainment Organization Deploys Deception for Insider Threat Visibility

Major entertainment company protects intellectual property from insider and stolen credential attacks

Financial Institution Thwarts Penetration Test with Deception

Financial institution uses deception to pass penetration test they failed with other security devices.

Using Deception Technology To Close Your Detection Gaps

In this session, we share insights into why deception technology has become a legal sector preferred security control for the early detection and identification of in-network threats that have bypassed prevention security controls and for its reliable alerting on insider security policy violations.

Deception Technology: Active Defense to Combat Advanced Threats

Attivo Networks deception technology provides the most authentic and comprehensive solution for detecting threats early in the attack lifecycle. Organizations shifting to an offensive posture will simplify detection operations and gain the critical tools they need to improve their security posture in the war against cyber attackers.

Financial Services Firm Deploys ADSecure During Red Team Evaluation

 A commercial bank with over $100 billion in total assets. 

Real Estate Investment Firm Tests ADSecure

 A major US-based real estate investment company with over 200 properties. 

Attivo Networks Fact Sheet

Attivo Networks®, the leader in deception for cybersecurity defense, provides a comprehensive deception-based platform designed for early and accurate detection of external or internal threats using any lateral movement attack method…

Defending the Retail Industry Against Cyber Attacks Using Deception

Due to the expansive attack surface and the large number of transactions made in various forms, adversaries are finding ways into retailer’s networks and are remaining undetected for sometimes months on end. Fraud prevention and detection for retailers is becoming increasingly challenging and a new approach to cybersecurity is needed.

German Webinar: Deception, die bessere Methode Widersacher zu erkennen!

Trotz steigender Ausgaben für Cybersecurity nehmen Anzahl und Ausmaß von Breaches zu. Darüber hinaus bleibt die Zeitspanne bis zur Entdeckung eines Einbruchs immer noch sehr hoch mit fast 78 Tagen im globalen Durchschnitt. Es stellt sich die Frage, ob wir vielleicht die falschen Methoden und Techniken zur frühzeitigen und akkuraten Erkennung eines Einbruchs oder des böswilligen Insiders verwenden?

Webinar: Deception for Speeding Up Your OODA Loop

Join Matt Devost, CEO & Co-Founder of OODA LLC. and Tony Cole, CTO of Attivo Networks for an in-depth discussion on cyber deception and how it plays into the OODA loop, the cycle of observe–orient–decide–act.

Active Directory Solution – ADSecure Infographic

With the ADSecure solution organizations improve Active Directory security without touching the production AD environment.

The Role of Deception in Healthcare Networks

Hear from Errol Weiss, CISO at H-ISAC, Steve Hunter, VP of Marketing at H-ISAC, and host Carolyn Crandall, Chief Deception Officer at Attivo Networks, in this fireside chat on the role of deception technology in healthcare networks. The discussion touches on real-world challenges and how deception is being used to combat these issues.

451 Research Webinar: Is It Really Possible to Lock Down an Endpoint? Yes, but Not How You Might Think.

Hear from Fernando Montenegro, Analyst at 451 Research, and Carolyn Crandall, Chief Deception Officer, and CMO at Attivo Networks, for an engaging discussion on the latest Endpoint Security research, challenges organizations are facing today, and why deception technology has created a winning strategy for locking down the endpoint.

Webinar: A New Way to Minimize Active Directory Security Risk

Hear from Chris Roberts, Chief Security Strategist of Attivo Networks, and host Sarah Ashburn, SVP of Sales and Customer Success at Attivo Networks, to hear about the company’s new ADSecure solution, which is designed to improve security to Active Directory (AD) and reduce risk. All, without interfering with the AD production environment.

How to Use Deception to Defeat Your Adversaries

During this webinar, Geoff Hancock, CEO at the Advanced Cybersecurity Group, and Tony Cole, CTO at Attivo Networks, will discuss how using deception can get you inside the attacker’s OODA loop, lead the adversary to make mistakes, and fortify your cybersecurity defenses.

Modern Deception Technology – Advanced Methods for Reducing Cyber Risk

Join host Carolyn Crandall, Chief Deception Officer at Attivo Networks, and special guest Edward Amoroso, CEO of TAG Cyber, to hear exclusive insights on how modern deception technology is being used for early and accurate threat detection, network visibility, and cyber risk reduction.

Webinar: Deception Imperatives and Vendor Comparison Spotlight

Industry veteran Jim Hurley, the CEO of Wellington Research and Cyber Source Data, will cover primary research results on cyber effectiveness and how it is influenced by detection and incident response. Additionally, attendees will gain insights into the latest Wellington Research Market Spotlight covering the vendors and market for deception.

Deception for Derailing Ransomware and Related Malware Attacks

 The Attivo Networks® ThreatDefend platform combats ransomware, and related malware, using a combination of the BOTsink® server hosting decoy systems, including network file shares, and the ThreatStrike® solution that places deceptive assets on the endpoints, including deceptive credentials and fake file shares. 

Cyber Deception Systems – Market Segment Report

Read the full Cyber Deception Systems report from Wellington Research to find out how Cyber deception Systems introduce a new defensive cyber paradigm unlike anything in the market today.

World-Renowned Vehicle Manufacturer Selects Attivo Networks to Protect its Research and Development Organization

Producing everything from jet aircraft to automobiles and motorcycles, this industry-leading manufacturer had recently created a fully dedicated cybersecurity team to protect their Intellectual Property “Crown Jewels.” Previously, information security was a distributed responsibility across their IT and Infrastructure teams. 

UK Financial Services Company Chooses Attivo Networks to Enhance its Security Stack with Deception Technology

Operating in the financial services sector, the organization must comply with a range of specific regulations, which made data security a top priority. The organization considered early and accurate detection highly important and had additional concerns with identifying lateral movement. 

Turning a Virtual Datacenter into a Virtual Minefield for Attackers

Join Technical Deception Engineer Joseph Salazar as he discusses turning a virtual datacenter into a virtual minefield for attackers with deception technology.

Private Sector Bank in India Chooses Attivo Networks to add Deception Technology for Enhanced Cybersecurity

Situation: As a large private sector bank in India, this organization is subject to the extensive regulations regarding cybersecurity, privacy, etc. The bank was familiar with deception technology, having deployed a competing solution over two years ago. 

Financial Services Company in India Chooses Attivo Networks to Expand Use of Deception Technology for Cybersecurity

 Situation: The organization was familiar with basic deception technology from their experience with a competitor’s product. However, they found that their existing solution only provided limited protection and they wanted a more comprehensive suite of deception functionality. 

eBook: Deception-Based Threat Detection – Shifting Power to the Defenders

This ebook provides a general introduction to deception technology and an overview of use cases from general detection to creating an active defense. You will gain a better understanding of how deception fits within your overall security architecture and the role it plays in detecting, identifying, and responding to threats.

ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™): A Definitive Market Guide to Deception Technology

This research from EMA  highlights how enterprises are using deception technology, the value they see in it, the challenges they have with it, and how they intend to use it in the future.

Case Study: Law Firm Chooses Attivo Networks Deception Technology as a Managed Service

The Attivo Networks ThreatDefend platform gave the firm the tools and visibility they needed to address their primary concerns of detecting lateral movement, thwarting insider threats, and providing an effective means to disrupt the spread of ransomware and related malware.

Case Study: Leading Multi-Country Bank Chooses Attivo Networks Deception Technology

 The Attivo Networks® ThreatDefend platform delivered a high-powered solution to defend their assets across an environment spread through several countries. 

Understanding Deception Technology

This document explains the role deception has historically played in attack and defense as well as highlights why it has become a necessary part of a modern cybersecurity stack. Deception technology is becoming a core necessity in any security architecture. 

Real Estate Investment Trust Chooses Attivo Networks to Provide In-Network Threat Detection

The CISO was familiar with deception technology and what it could do for their environment but was convinced that free and open source (FOSS) offerings and FOSS based commercial solutions could satisfy their needs. After a product demonstration, the CISO’s opinion was swayed and opted into deception.

Financial Services Software Company Selects Attivo’s ThreatDefend Platform to Protect Cloud Assets at Scale

 The software development company had experience with deception technology from their previous deployment of a competitor’s solution. The ThreatDefend platform won the competitive bake-off by demonstrating superior performance, easy deployment, comprehensive protection, and scalability for the company’s cloud-centric environment.

MSSP Works with Large Metropolitan Public School District to use Deception for Network Visibility

State University System Chooses Deception for Enhanced Detection and Incident Response

Carolyn Crandall at Black Hat 2019 with Security Weekly

Who let the wolves out? Attivo did. Specifically, with its deception technology fabric, which interweaves “wolves in sheep’s clothing” throughout the network to deceive attackers, detect their presence, and derail their attacks. Complemented with attractive bait designed to lure in its adversary, every attack surface becomes a virtual minefield. This session touches on the announcements, market and company momentum with CMO Carolyn Crandall

Defending Against Insider Threats with Attivo Networks Deception

Insider threats are one of the most difficult challenges an organization can face. Where a range of conventional defenses exist to thwart exterior threats, malicious actors within an organization are much more difficult to identify and contain. This paper will delve into the challenges presented by insider threats and how deception technology can provide accurate and early insight into policy violations and malicious activity. 

Dynamic Deception for Industrial Automation and Control Systems

Building a comprehensive security strategy for the real-time, actionable detection of a cyber attack. By: Tony Dao, Director of Information Technology, Aspect Engineering Group

Deception to Enhance Endpoint Detection and Response

Deception technology is “sleight of hand” for your environment, diverting attackers away from production assets and strengthening the other components of your cybersecurity stack. Coupled with EDR on the endpoints and conventional perimeter defenses, a deception suite enhances your defense-in-depth strategy and makes an attacker’s job radically more difficult, substantially altering their attack economics and giving defenders the advantage. 

Attivo Networks® ThreatDefend™ Platform and the ISO/IEC 27000 Family of Standards

The International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) 27000 family of standards helps organizations keep information assets secure. 

Behind the Mask with Alan Commike and Carolyn Crandall at RSAC 2019

Accomplished cyber security technology leader, Alan Commike, and Chief Deception Officer, Carolyn Crandall, sit down to discuss the benefits of Deception Technology at RSA 2019

Carolyn Crandall and Lance Spitzner at RSAC 2019

Carolyn Crandall, Attivo Networks Chief Deception Officer, and Lance Spitzner, founder of the honeynet project, discuss the evolution of deception technology at RSAC 2019 in Broadcast Alley.

ThreatDefend® Platform Feature Highlight: ThreatDirect®

The Attivo Networks® ThreatDefend® platform includes the ThreatDirect® feature that provides organization with the ability to easily and efficiently project deception into remote locations and microsegmented networks, extending their coverage without needing to deploy additional BOTsink® deception servers. 

Deception Through the Eyes of a Forensic Researcher

Deception arms the defender with early detection, automated attack analysis, endpoint forensics, and substantiated alerts for accelerated incident response.

ThreatDefend® Feature Highlight: Vulnerability Simulation

Organizations can configure the Attivo Networks® BOTsink® appliance to simulate known vulnerabilities, giving highly accurate alerts if an attacker attempts to leverage one against the organization. This form of simulation responds to an attacker’s effort as if it was vulnerable without actually compromising the target host or allowing the attacker to expand their footprint.

ThreatDefend® Feature Highlight: Decoy Documents

Attivo’s Decoy Documents capability is available across the entire BOTsink range, including physical, virtual, and Cloud instances.

Cyber Deception: How To Build A Program

Geoff Hancock has been in cybersecurity for 27 years. He has worked in the military, intelligence community, civilian agencies and corporations, conducting cyber operations, Active Cyber Defense, Deception and Intelligence. He has been a CISO, CTO and VP and currently is the CEO of Advanced Cybersecurity Group, where he heads up a team of cyber deception and intelligence analysts providing instruction and program operations. Understand the value of having a cyber deception plan in place and learn the information you need to know to get one started in this white paper.

Attivo BOTsink® 3550 Data Sheet (Only Available in India)

The Attivo BOTsink 3550 appliance is scaled to support medium-sized deployments offering a full range of deception functionality and additional features. This appliance is only available in India.

Deception Myths: Clarifying Industry Misconceptions

The earliest deception systems were used primarily for research and they were difficult to set up and maintain. Those preliminary experiences have led to some myths and misconceptions about deception. This paper will address and debunk those myths, while detailing how deception has evolved into an invaluable asset for organization’s Defense in Depth postures.

Threat Deception for an Active Defense

Attivo Networks® deception-based threat detection shifts the power to the defender with a unique approach that reduces risk, accelerates incident response, and improves the overall effectiveness and efficiency of existing security controls. To learn more about deception-based threat detection, view this document.

ThreatDefend Platform Feature Highlight : Authentic Deception

At its core, deception technology relies on presenting an attacker with decoys and lures that are indistinguishable from real assets. Highly authentic decoys are vital for any organization looking to add deception technology for in-network threat detection. This feature highlight addresses the importance of authenticity in deception and the ways in which Attivo Networks has made authenticity a core feature of the ThreatDefend platform.

Assessing Deception Technology for a Proactive Defense

This paper takes a detailed look at what an ideal deception system should encompass, with an emphasis on how deception technologies can protect a production environment, including a checklist to help assess the options.

Survey Report: Top Threat Detection Concerns and Trends

To gain more insights into top detection trends, Attivo Networks® surveyed more than 450 cybersecurity professionals and executives globally to gain insights into detection trends, top threat concerns, attack surface concerns, and what’s on their 2019 security wish list.

Major Financial Services Company Case Study

The Vice President of Cybersecurity required better visibility into their large and diverse international network that spanned corporate and remote offices.

Regional Bank Case Study

Penetration testing conducted by a 3rd party red team revealed security gaps in several areas of detection and visibility. The financial institution wanted to improve their detection and response capabilities.

Attivo Networks® BOTsink® Family Data Sheet

The Attivo Networks BOTsink family offers a range of systems to meet the diverse needs of organizations, and are available as physical appliances, virtual appliances, or as a Cloud instance.

Deception Technology: Fad or Fashion for 2019

Deception technology adoption soared in 2017 and 2018. Was this simply a fad or is deception coming into fashion as the de facto in-network detection security control?

An Insiders Blueprint to Deception and Medical Device Security

How deception technology is actively solving unique cyber challenges faced by healthcare organizations.

M&A Customer Case Study

This white paper will delve into some of the information security challenges organizations are likely to face during the M&A process, and how using deception technology to identify potential issues and will make the infrastructure integration process smoother and more secure.

Attivo Networks Deception Technology for Mergers and Acquisitions

Deception technology can play a critical role in Mergers and Acquisition situations, providing vital detection and visibility capabilities for due diligence and post-merger integrations. Check out this white paper for more on the benefits of deception technology before, during, and after a merger/ acquisition scenario.

Meeting HIPAA Requirements with Attivo Networks Deception Technology

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) laid out a broad range of rules for Healthcare providers in the United States that fundamentally changed how these organizations were required to handle patient information. In this paper we will look at how deception technology can help an organization meet these requirements effectively, and efficiently, specifically in the context of Information Security.

Attivo Networks® ThreatDefend Platform and the MITRE ATT&CK Matrix

The Attivo Networks ThreatDefend Deception and Response Platform provides extensive capabilities to detect many of the techniques outlined in the ATT&CK Matrix.

Attivo Networks® ThreatDefend Platform and the NIST Cybersecurity Framework

The National Institute of Standards and Technology (NIST) Cybersecurity Framework provides a policy framework of computer security guidance for how private sector organizations in the US can assess and improve their ability to prevent, detect, and respond to cyberattacks. This white paper explores the ways in which the Attivo Networks ThreatDefend Deception and Response Platform provides extensive support to meet the guidance set forth by the NIST Cybersecurity Framework.

Major Energy Provider chooses Deception Technology to Better Protect Critical Assets

The Director of Cybersecurity for a large public energy utility organization had confidence in their perimeter security, but realized they needed better visibility into their internal network in the event of a compromise or when facing an insider threat. Read the full case study to learn more.

Cisco 2018 Annual Cybersecurity Report

What if defenders could see the future? If they knew an attack was coming, they could stop it, or at least mitigate its impact and help ensure what they need to protect most is safe. The fact is, defenders can see what’s on the horizon. Many clues are out there—and obvious.

Attivo Networks Threat Deception to Comply with the Reserve Bank of India Cybersecurity Framework

This whitepaper explains how the Attivo Networks® ThreatDefendTM platform enables organizations to meet specific compliance issues specified in the RBI CS Framework, along with numerous other requirements. This paper further explains how the Attivo Networks solution provides comprehensive detection and response to organizations under threat.

Black Hat 2018: Election Hacking, Active Defense, and More…

Written by: Carolyn Crandall, CMO and Chief Deception Officer

Attivo Networks® Threat Deception For Early Cloud Attack Detection

Attivo Networks® has created solutions for multi-cloud environments including AWS, Azure, Google Cloud, OpenStack, and Oracle Cloud to provide advanced real-time in-the-cloud threat detection with flexible and automated deployments across any number of Virtual Private Clouds (VPCs).

Tony Cole, Attivo Networks CTO, at InfoSec Europe 2018

Tony Cole, Attivo Networks CTO, discusses deception technology at InfoSec Europe in London.

How Threat Deception Fits Within Your Security Stack

Discussion about real-world threat detection deployment experiences and the reasons why organizations are choosing deception technology.

Threat Deception for the Legal Sector

Legal organizations are actively turning to deception technology as the preferred method for early and accurate detection of threats that have bypassed other security controls. Deception technology gives legal organizations the internal visibility often lacking in traditional security infrastructures. To learn more about what benefits the Attivo solution can offer to the legal sector, see our white paper.

And That’s a Wrap – Gartner Security and Risk Summit Recap

Written by: Carolyn Crandall, CMO & Chief Deception Officer

10 Security Projects CISOs Should Consider: Gartner Analyst

At last week’s Gartner Security Summit in National Harbor, Maryland, Gartner analyst Neil MacDonald outlined 10 cybersecurity projects that could go a long way toward reducing enterprise security risk.

Healthcare IoT Device Case Study

HEALTHCARE CUSTOMERS DETECTS INFECTED IOT DEVICES

The Attivo Solution detected malware spreading from IoT medical device that bypassed all existing security controls.

Tony Cole -Chief Technology Officer

Why Deception Technology?

Written by: Tony Cole, Attivo Networks CTO

 

Deception for a SWIFT Defense

The SWIFT network links more than 11,000 financial institutions in more than 200 countries and territories worldwide, and as such, requires a level of trust between member institutions to ensure the integrity of the network. Unfortunately, the SWIFT network has increasingly become a target of attackers over the past few years and traditional security measures are no longer sufficient to deter and stop attackers. This white paper delves into the ways deception technology addresses these challenges.

Attivo Networks® DecoyDocs Datasheet

The ThreatDefend Deception and Response Platform provides an inherently offensive counterintelligence function. The solution seeks to disrupt and degrade the information-gathering and attack operations an adversary conducts inside the network, while at the same time providing collective counterintelligence functions by helping develop threat and adversary intelligence.

Attivo Networks® Spotlight Series – What makes Deception Technology Uniquely Valuable

Carolyn Crandall, Chief Deception Officer of Attivo Networks interviews Joseph Salazar, Technical Marketing Engineer in a Showcase Series on the topic of deception technology.

Attivo Networks® Behind the Mask Interview with Director of Cybersecurity George Insko

Carolyn Crandall, Chief Deception Officer of Attivo Networks interviews George Insko, Director of Cybersecurity. George shares his experience with deception technology in Attivo Network’s Behind The Mask Series. These videos will reveal the myths and realities of deception technology in a series designed to educate interested parties on the value of deception for threat detection and accelerated incident response.

Attivo Networks® Behind the Mask Interview with Cybersecurity Expert Sarath Geethakumar

Carolyn Crandall, Chief Deception Officer of Attivo Networks interviews cybersecurity expert Sarath Geethakumar. Sarath shares his experience with deception technology in Attivo Network’s Behind The Mask Series. These videos will reveal the myths and realities of deception technology in a series designed to educate interested parties on the value of deception for threat detection and accelerated incident response.

Attivo Networks® ThreatStrike™ Solution: Endpoint Deception-based Detection

The Attivo ThreatStrike End-Point Deception Solution is a customizable and non-intrusive technology that is used to identify targeted attacks of infected end-points, infected servers/VMs, the use of deception stolen credentials, and ransomware attacks on networked drives. The solution also provides for suspicious email submission for threat detection.

NBC News The “Hack Back” Bill with Tushar Kothari

Attivo Networks CEO Tushar Kothari explains a proposed bill to allow victims to hack their hackers

Tony Cole Explains Why CISOs Need to Shift Focus to Detection

Carolyn Crandall, Chief Deception Officer of Attivo Networks Interviews Tony Cole, Chief Technology Officer of Attivo Networks at RSAC 2018. Tony explains why organizations need to shift their focus towards detection to quickly mitigate the risk of breaches and shrink dwell time. Insight is provided on how deception technology empowers cyber defenders with an active defense.

Attivo Networks® ThreatPath™ Platform Overview

The Attivo ThreatPath™ solution provides an attack path vulnerability assessment based on likely attack paths that an attacker would traverse through misconfigured systems or credential misuse.

Trends at RSAC 2018 and The Rise of Deception Technology

Carolyn Crandall Interviews Tony Cole, Chief Technology Officer of Attivo Networks at RSA Conference 2018. Tony gives advice to CISOs evaluating vendors and shares why deception is a critical security control for outmaneuvering adversaries as they continue to evolve.

Attivo Networks® CEO Tushar Kothari Interview with Nasdaq

Tushar Kothari interviews with Nasdaq about Attivo Networks and deception technology

Attivo Networks® ThreatOps™ Platform

The ThreatOps™ Platform works hand-in-hand with the BOTsink engagement server for in-network threat detection, attack analysis, and acceleration of incident response.

GDPR with Deceptive Technology Perspective

GDPR is The General Data Protection Regulation which will radically change the data usage and protection landscape when the document comes into force on May 25th, 2018.

Deception Technology—Much more than a Honeypot

This solution brief will detail the origins of honeypots, the logic behind them, and what features ultimately inhibited their universal adoption – followed by a look into what comprises present-day deception technology, how it has evolved, and the functionalities that are catalyzing worldwide deployment and adoption.

Deception Technology: Changing the Game on Modern-day Attackers (In Collaboration with FS-ISAC)

Learn how deception technology is closing the detection gap and reducing attacker dwell time for financial institutions.

BD and Attivo Networks Provide Visibility and Detection of Cyberattacks on IoT Medical Devices

Collaboration Advances Medical Device Cybersecurity

Deception-based Threat Detection Myths and Realities, In Collaboration with NH-ISAC

Discussion on the myths and realities surrounding the effectiveness of deception for advanced threat detection within healthcare organizations.

Attivo Labs Research: Petya/Not Petya Wiper Attack Analysis

Petya wreaks havoc by locking the hard drive MFT and MBR sections and by preventing computers from booting.

Attivo Labs WannaCry Report

Ransomware attacks continue to be a top threat.

Attivo Networks® ThreatDefend™ Deception and Response Platform Overview

A brief introduction to deception technology and the Attivo Networks ThreatDefend Deception and Response Platform.

Attivo Networks Deception Platform Integrates with BD Medical Devices

Attivo Networks Deception Platform Integrates with Becton, Dickinson Medical Devices to Provide Advanced IoT Threat Detection

Deception-based Threat Detection, with a Financial Institution’s Perspective

Engaging Q&A about real world threat detection deployment experiences and reasons why financial services organizations are choosing deception technology.

Ovum Research Report Overview and Analyst Perspectives

Rik Turner, Principal Analyst at Ovum and Carolyn Crandall, CMO from Attivo Networks engage in an interactive discussion on the changes in security detection technology trends.

Myths and Realities of Deception Defenses

In an interview at Information Security Media Group’s recent Healthcare Security Summit Carolyn Crandall discusses the value of deception technology solutions.

Deception Technology for Financial Institutions

This paper explores challenges faced by financial organizations and how deception technology changes the game on attackers with reliable in-network threat detection and response capabilities.

ThreatOps™ Incident Handling and Response

There are many challenges faced by IR and SecOps that technology innovations can now address. The Attivo Networks ThreatDefend Platform accurately and efficiently addresses these challenges while extending the value of existing security infrastructure 

Deception in Security Penetration Testing

As many organizations look to test their network resiliency, penetration tests are playing an increasingly integral role in understanding an environment’s vulnerabilities through the simulation of a real attack. Deception provides early and efficient warning of attacks, whether they originate from malicious internal or external threat actors or from a security tester. 

BOTsink® Analysis Functions

To help security analysts investigate incidents, gather forensic evidence, and analyze malware, the BOTsink provides the Attack Threat Analysis (ATA) engine and the Malware Analysis Sandbox (MAS).

BOTsink™ Decoys and Engagement Servers

The BOTsink™ solution provides the foundation for the ThreatDefend™ platform, turning the entire network into a trap with a matrix of distributed decoy systems.

Deception for Enhanced Cloud Security

The Attivo ThreatDefend platform is designed to integrate seamlessly with AWS, OpenStack, and Azure deployments to scale to organization’s cloud needs

Ovum, On the Radar: Attivo Networks offers deception, vulnerability assessment, and response automation

The ThreatDefend™ portfolio includes all these capabilities.

2018 TAG Cyber Security Annual-Volume 3

Attivo Networks is a Distinguished Vendor in this year’s 2018 TAG Cyber Security Annual for the second year running.

BBC Recaps Black Hat 2017

BBC recaps the latest in hacker tech at Black Hat, BSides, and Defcon

ThreatStrike™ EndPoint Deception Suite

The Attivo ThreatStrike Endpoint solution provides early and accurate detection of targeted attacks on endpoints and servers.

Discussion on Deception Webinar

Learn why deception is recognized as a top 2017 security technology to consider for detecting in-network threats.

ThreatPath™ Attack Path Vulnerability Assessment

The ThreatPath solution provides continuous attack path vulnerability assessment.

Fox News and Carolyn Crandall Talk Deception Technology

Attivo Networks CMO Carolyn Crandall speaks with FOX News at Black Hat 2017

New Variant of Shamoon Surfaces, Targets Saudi Arabian Organizations

The end of 2016 saw the return of a familiar attack campaign that wipes the disk of any infected computer.

The Benefits of Deception for SCADA Environments

Conventional incident response plans don’t account for SCADA.

Attivo Networks Detects In-Network Attack at Major Petrochemical Company

These activities were missed by all their other internal detection systems.

Portfolio Overview

Insight into how deception technology works, Attivo Networks ThreatDefend Deception and Response Platform, and how to detect in-network threats and accelerate incident response.

Introduction to Attivo Networks at AFCEA West 2017

Introduction to Attivo Networks and deception technology at AFCEA West 2017.

Introduction to Deception Technology

A brief introduction to deception technology and the Attivo Networks ThreatDefend Deception and Response Platform.

Attivo Networks 2017 Survey Report: Need for Visibility and Efficiency Drives Rapid Shift to Detection

This study, sponsored by Attivo Networks, surveyed security professionals representing a diverse set of industries, including financial services, healthcare, telecommunications, retail, manufacturing, hospitality, and education, as well as a wide spectrum of sizes measured by both revenue and number of employees. The survey reveals a significant shift in security budgets from prevention to detection devices.

Integrating Attivo Networks and Carbon Black – BlackHat 2016

Attivo Networks CMO Carolyn Crandall speaks to the power of the integration between Attivo Networks and Carbon Black.

Deception as a Security Discipline for Advanced Threat Detection and Defense

Will the addition of deception deliver a bona fide return? We believe that deception delivers an effective and efficient defense and will share our rationale in this webinar.

Detect Infected Machines and Stop Data Exfiltration with Attivo Deception Platform and Juniper SRX Firewalls

Attivo Networks integrates with Juniper SRX Firewalls

Attivo Networks Deception Platform Integrates with the Check Point Management Server

Attivo Networks integrates with Check Point Management Server

Healthcare Industry Under Attack… Nasty Strain of Malware Resurfaces and Challenges Security Operations Team with

What healthcare security operations teams can do to better defend their companies

How to Evaluate Deception Platforms and Checklist

An in-depth answer to the questions surrounding deception technology

New Attacks Highlight Need for a New Approach to Cyber Protection

Are current prevention techniques enough to stop modern cyber threats?

CISO

Information Security: A Corporate Responsibility that goes beyond the CISO

Going beyond the CISO

What Brexit Means for the Cyber Security Industry

Brexit: Contributor to the shrinking cyber security labor pool?

Legal Settlements Could Place More Urgency On Healthcare Security

The cost of poor healthcare security might have just gotten more expensive.

Uncertainty as a Goal of Deception in Cyber Security

“Enterprise cyber security teams must begin accelerating the use of deception in their infrastructure”

National Health IT Week, Don’t Forget to Focus on Cyber Security

How can the most targeted industry protect themselves from cyber threats?

Deception Technology Comes of Age

What does it mean to be more than just a DecoyDoc?

Securing Patient Data When Prevention Systems Have Failed with Daniel from Mission Health

InfoSec Professional explains how he used deception technology to stop the aggressive spread of Qakbot

Attivo Networks Deception Platform for Forensics and Incident Response

Regional healthcare organization inoculates their network against aggressive Qakbot malware

Semiconductor Company Implements Deception to Stop Man-in-the-Middle Attacks

Semiconductor manufacturer adopts deception for real-time Man-in-the-Middle detection

Aflac, Inc. Uses Deception for Zero-False-Positives Threat Detection

Aflac, Inc. uses deception to stay one step ahead of cyber attackers

Aflac, Inc. Uses Deception for Zero-False-Positives Threat Detection

DJ Goldsworthy, Threat Manager at Aflac, Inc., speaks to the power of deception technology

Harnessing Unparalleled Visibility in Cyber Attack Investigations

Demo of advanced forensic analysis, reporting, and how prevention system integrations expedite remediation.

What’s Lurking Deep in Your Network

Advanced techniques for finding malware lurking in corporate domains, remote offices, data centers, and in the cloud.

Checklist for Evaluating Deception Platforms

What deception technology is and how it provides an effective solution for detecting in-network threats in real-time.

Know What is Lurking in Your Network

Find out how deception technology allows for in-network detection of advanced threats.

Deception for Attack Detection of IoT Devices

This document will address the security concerns with the latest in security for connected devices—deception technology.

Pre-emptive Spear Phishing Management

Learn why phishing is one of the top cyber attacks occurring, how it works, and the steps an organization can take to protect their employees.

The Role of Dynamic Deception in the Cyber Kill Chain

Learn about the challenges of today’s threat landscape and the opportunities to address holes in the cyber attack lifecycle.

The Attivo BOTsink Platform Integrates with the Blue Coat ProxySG

Attivo Networks integrates with Blue Coat ProxySG

Attivo Networks Partner Integrations for an Active Defense

Deception technology in the cyber security eco-system

SC Magazine Review

“It is, really, a high interaction honeypot on steroids”

Introduction to Attivo Networks – RSA 2016

Attivo Networks CMO Carolyn Crandall Introduces Attivo at RSA 2016

Interview With Tushar Kothari

SiliconANGLE interviews Attivo Networks CEO Tushar Kothari at Juniper Networks NXTWORK 2015.

At-a-Glance

Brief look into how the Attivo Deception and Response Platform detects in-network threats and accelerates incident response.

2019 TAG Cyber Security Handbook and Reference Guide

Attivo Networks is a distinguished vendor in the annual 2019 TAG Cyber Security Annual – Outlook for Fifty Cyber Security Controls. The Annual is a practical handbook and reference guide, designed for the working cybersecurity professional, created from expert advisory research based on discussions, interviews, website material, and other information.


Cost Savings of Deception Quantified

Watch this webinar with Kevin Fiscus of Deceptive Defense, Inc. and Carolyn Crandall the Chief Deception Officer and CMO of Attivo Networks where Kevin shares his research findings on the cost savings associated with deception technology.

Mapping Your Active Defense Capabilites to MITRE Shield

Join Edward Amoroso, CEO of TAG Cyber, and Tushar Kothari, CEO of Attivo Networks for a technical discussion on how Attivo Networks solutions address the MITRE Shield tactics and techniques to maximize detection coverage, deliver insights into what tools attackers are using, identify their activities, and gather intelligence into what adversaries are seeking.

Calculating ROI for Attivo Deception and Concealment Technology

Cybersecurity professionals understand the value of deception technology. Unfortunately, while they may have input when determining the merits of security solutions to purchase, they do not often have the authority to influence budgets, which means that they must find a way to financially justify a new security technology to the CFO and others. How can they clearly explain the value?

Beers & Bytes Episode 11 Tony Cole Deception Technology Expert

Tony Cole, Attivo Networks CTO, candidly discusses their offensive play with deception. Tune in to hear about integrations (they have 32 integrations now), how they’ve gotten to owning over 60% of the market, free 30-day trials of their most in-demand products. The SMB market can also utilize Attivo Networks at a low-cost point. If you have EDR you need EDN to fill in the gaps. Hear more now.

Attivo Networks® ThreatDefend® Platform and the Mitre ATT&CK® Matrix For Cloud

The Attivo Networks ThreatDefend® platform provides extensive capabilities to detect many of the techniques and sub-techniques outlined in the ATT&CK Matrix for Cloud.

Enhancing OT Deception with Model Driven, High Fidelity Decoys

This webinar presents the capabilities developed by the Pacific Northwest National Laboratory and Attivo Networks collaboration under the Department of Energy Technology Commercialization Fund program to create enhanced deceptions for defense of critical infrastructure OT systems.

Attivo Networks ThreatPath Cyber Hygiene & Attack Surface Reduction

The Attivo ThreatPath® solution, part of the modular ThreatDefend Endpoint Detection Net family of products, provides continuous attack surface monitoring, reduces attack paths, and improves organizations’ cyber hygiene.

Attivo Networks Named a 2021 TAG Cyber Distinguished Vendor

Attivo Networks is honored to be recognized for the fifth year in a row as a Distinguished Vendor. Additional information and an interview with CEO Tushar Kothari can be found starting on page 92.

Deception Defense Platform for Cyber-Physical Systems

There is an ever-increasing number of cyber-attacks targeted at cyber-physical systems vital to the operation of our critical infrastructure. Everything from disruption, destruction, data loss, or general rampant internet threats have become a risk to cyber-physical systems that were once thought isolated and secure from cyber threats.

In Security News – Deception ROI

Kevin Fiscus, Founder of Deceptive Defense shares his research findings on the cost savings associated with deception technology.

DataCloak, Innovations For Hiding Data and Denying Access to Attackers

The Attivo concealment, DataCloak framework, works hand-in-hand with a layered defense strategy and prevents attackers from being able to discover the data they are seeking

Attivo Deception MITRE Shield Mapping

Attivo evaluated its ThreatDefend® Platform capabilities against all Active Defense techniques and use cases documented per technique in the MITRE Shield knowledge base. Download this paper to learn how the ThreatDefend components provide the building blocks needed for an Active Defense strategy.

Cyber Deception Significantly Reduces Data Breach Costs & Improves SOC Efficiency

The combination of detecting attacks early, reducing the cost of a data breach by an over 60%, and improving SOC efficiencies by 32% can result in significant savings for organizations both large and small. When paired with the ability to boost EDR detection rates by over 42%, according to testing with the MITRE ATT&CK® framework DIY tool, this can be a powerful security control to add to every defender’s arsenal.

In-Security Update: ADSecure

Tune in with Carolyn Crandall, CMO and Chief Deception Officer and Tony Cole, CTO as they discuss the state of Active Directory protection and how to leverage the Attivo Networks ADSecure solution to gain visibility to AD attacks, privilege escalation attempts, and attacker lateral movement – all without altering or interfering with production Domain Controllers.

Adversaries in the Wire – Stopping In-Network Threats

Watch this on-demand session to learn how Deception Technology Detects credential theft and unauthorized AD queries, Disrupts host fingerprinting and service discovery, Deflects lateral movement activity, and Detects and alerts on attackers early in the attack cycle.

Hunting Threats with FireEye and Attivo Networks

Watch this session to learn how: The ThreatDefend platform detects advanced attackers with speed and accuracy, the joint solution captures and analyzes advanced malware threats,  accelerates incident response with automated blocking of infected systems, and collects forensics, and develops company-centric threat intelligence.

Hide and Deny Access to Ransomware Attackers

Get unique insights into the most modern ransomware attack tactics and how the Attivo ThreatDefend solution is used to achieve early detection of cyber-attackers. New Endpoint Detection Net (EDN) capabilities will be shared along with how they prevent attackers from moving laterally, escalating privileges, and finding and accessing the files, folders, mapped network, and cloud shares they seek to tamper with.

Attivo Networks Customer and Analyst Quotes

Due to the confidential nature of our technology, many of our customers have requested that we not attribute their names or companies to their quotes, as to not tip off adversaries or insider threats that deception technology is deployed in their environment. As a result, we have anonymized all customer quotes and marked each one with the customer’s job title, business vertical, and/or company size.

Deflect Attacks with the Endpoint Detection Net Suite

The EDN Deflect function brings a needed capability to make every endpoint a part of the deception fabric. By denying attackers the ability to collect accurate information on their targets and disrupt their ability to move laterally undetected, the Deflect function gives organizations an early warning and an active defense against malicious East/ West traffic to increase their security posture and catch attackers early in the attack cycle.

Scaling Detection with the ThreatDirect Solution

It is critical to have visibility across the entire network with no gaps based on location or resource limitations. With the ThreatDirect solution, organizations can now scale their adaptive defense across remote areas of their network with full-featured deception-based detection, automated attack analysis, and accelerated incident response capabilities.

Ransomware Mitigation

The Attivo Networks Endpoint Detection Net (EDN) ransomware mitigation functions arm security teams with the defense they need to detect and derail both common and advanced ransomware attacks quickly.

EDN Datasheet

By adding the EDN suite to existing EPP and EDR solutions, organizations can strengthen their endpoint defenses and deny attackers a foothold into the network.

Federal News Network Executive Briefing: Cybersecurity Strategies

Federal News Network and Attivo Networks asked a panel of federal cybersecurity practitioners for a read on the most contemporary cybersecurity thinking. Read on to learn more.

CDM Webinar: Game Changing Breach Defense by Dramatically Improving Endpoint Security

Hear from Attivo Networks CTO, Tony Cole, in this discussion on how to better protect your endpoints and prevent attackers from moving laterally across your enterprise.

Using a Commercial Deception Solution to Improve MITRE ATT&CK Test Results for Endpoint Security

Dr. Edward Amoroso, CEO of TAG Cyber, outlines the results of a recent round of MITRE ATT&CK testing performed for four top endpoint security tools. Find out how the performance and detection of these tools improves by an average 42% when used in conjunction with Attivo Networks EDN suite.

MITRE ATTACK: Augmenting Endpoint Defenses with the Attivo Networks® EDN Solution

Thanks to the MITRE Corporation’s ATT&CK matrix product evaluations, Attivo Networks now has data clearly demonstrating that its EDN suite improves endpoint security by augmenting existing endpoint security controls to boost overall detection performance. Learn more.

Better Endpoint Defense with CrowdStrike and Attivo Networks

Watch this on-demand webinar to learn about the integration between the Attivo Networks ThreatDefend® platform and the CrowdStrike Falcon Insight EDR solution that combines accurate in-network detection with automated response actions to isolate attackers and empower organizations to respond quickly to attackers already inside the network.

9 Notable 2020 CISO Challenges – Are they the Same as Yours?

The world has changed in so many ways in 2020. Even with the best-laid plans and precautions, CISOs have had to quickly respond to the COVID-19 pandemic, revising strategies and transitioning from unprepared to prepared. Read on for a list of important things CISOs are tackling as they look to stay one step ahead in these rapidly changing times.

Customer Experiences in Real World Deception Deployments

Hear from Sarah Ashburn, SVP of Sales and Customer Success & Robert Crisp, VP of Field Technical Operations, on the real-world detection alerts from Attivo Networks customers and the information collected in those alerts.

SINC Report: The Cybersecurity Landscape: Challenges & How to Overcome Them

This study measured the state of cybersecurity today in the United States. SINC contacted companies with 1,000+ employees, with over $25 million in annual sales. The title levels of respondents included: CISO, CIO, Cybersecurity Director, Security Risk Officer/Manager, Directory of Security, and VP of Security.

Behind the Scenes with Attivo Networks

Go behind the scenes with CEO, Tushar Kothari, CTO, Tony Cole, and CMO & Chief Deception Officer, Carolyn Crandall as they discuss the state of cybersecurity, the value of deception-based threat detection, and more.

Attivo Networks ThreatDefend Platform SIEM Integrations

The rapid pace of attacks, existing security challenges such as staff shortages, and the ever-increasing alert volume drive the security industry to embrace the notion of consolidating data resources and orchestrating actions across vendors, open-source projects, and internal development efforts. Read on to learn more about our SIEM integrations.

Customer Experiences in Real-World Deception Deployments

In this webinar, you will have the unique opportunity to hear from three behind-the-mask security practitioners who are actively using Attivo Networks deception technology in very different environments.

NIST is Doubling Down on Deception and You Should Be Too

Todd Helfrich, VP of Federal Sales & Tony Cole, CTO at Attivo Networks sit down to discuss the relationship between the NIST framework and the Attivo Networks deception-based threat detection solution.

Reducing EDR Cyber Risk with Deception

Hear from Tushar Kothari, CEO of Attivo Networks and Edward Amoroso, CEO of TAG Cyber in this technical discussion of how deception can be used to dramatically reduce cyber risks to modern endpoints.

NIST: 800-160(2) and 800-171(B) Securing High Value Assets and Confidential Unclassified Information

This paper will very briefly summarize these NIST publications, introduce deception technology, and show how deception technology fits within the NIST guidelines to support regulatory compliance and enhanced security.

Optimizing Endpoint Protection

Prevent attackers from breaking out from an infected system by restricting their ability to move laterally or conduct reconnaissance.

Attivo Networks Brand Guidelines

This guide informs Attivo Networks Partners and design agencies on the appropriate implementation of Attivo Networks logos, partner badges, fonts, color, terminology, and design elements for materials commonly used in advertising, marketing, and demand generating activities.

Attivo Networks Cyber Word Search

Print out this cybersecurity-focused, family-friendly word-search and race to see who can complete it first, you or your kids? In the end, we have included some useful tips to share with your young ones about how to stay safe online during this time. Have fun!

Integrating Deception with DevOps

Organizations can deploy deception across the DevOps cycle to get insights into attacker activity and alert on any misconfigurations. Learn more about how Deception complements existing DevSecOps security controls in this white paper.

Deception Technology Use Cases to Defeat Advanced Attackers

Check out this use case document to find out how to strategically use deception technology to defeat even the most advanced threat actors.

How To Reduce Remote Worker VPN Risk

Watch this webinar to hear how deception-based threat detection solutions are adding a safety net of early and accurate threat detection for VPN environments.

Endpoint Detection Net Suite Use Case

It is critical for organizations to protect their endpoints and prevent attackers from spreading throughout the network. Most will use various forms of EPP and EDR solutions to defend endpoints from attacks. The Attivo Networks® Endpoint Detection Net (EDN) suite provides capabilities that complement these existing endpoint security solutions.

Detecting the Deceivers through Deception

In this session we discuss deception tactics that defenders can use on adversaries to gain fast and high-fidelity detection across an enterprise. Hear why this defensive fight is relevant to companies large and small, regardless of security capability maturity.

2019 Top Threat Detection Trends Survey

Throughout 2019, Attivo Networks conducted worldwide research to capture top trends related to cybersecurity threat detection. The company surveyed 1,249 security professionals with participants in North America, LATAM, Europe, and Australia, representing predominantly midsize and large firms across 15 different industry sectors.

How Deception is Shaping our Future

How are we using deception, and where could we be more effective, including a look towards the future of this technology and where/how to apply it.

 

Deception & Active Defense for Election Security

This talk covers where deception technologies are today, the future of deception for cyber defense, and is delivered by Chief Security Strategist Chris Roberts.

Securing The Enterprise When Employees Work Remotely

For various reasons, many companies are encouraging or being requiring to have employees to work from home. This shift in employees working in a less secure environment creates a significant opportunity for cybercriminals and reduces their time to compromise.

Defending Against Credential-Based Attacks – Protecting the Keys to the Front Door

To protect against credential-based attacks, organizations have implemented solutions such as Multifactor Authentication or Privileged Access Management that seek to curtail unauthorized access. However, these solutions still have gaps that an organization can bridge with Deception Technology.

Deception Technology in 2020 – ISMG Interview

Deception technology has moved from being an emerging technology to a more mainstream security control, say Tony Cole, CTO, and Carolyn Crandall, chief deception officer and chief marketing officer, at Attivo Networks.