Support Login
 

Resource Center

Welcome to the Attivo Resource Center. Here you will find resources to learn more about Attivo and Attivo threat detection solutions.

  • Categories

  • Format

Ovum Research Report Overview and Analyst Perspectives

Rik Turner, Principal Analyst at Ovum and Carolyn Crandall, CMO from Attivo Networks engage in an interactive discussion on the changes in security detection technology trends.

Deception for Mergers & Acquisitions

When an acquisition is announced, both organizations experience an increase in target profiles and public visibility. This typically results in both organizations making themselves targets of increased cyber threats and attacks.

Black Hat 2018: Election Hacking, Active Defense, and More…

Written by: Carolyn Crandall, CMO and Chief Deception Officer

Attivo Networks® DecoyDocs Datasheet

The ThreatDefend Deception and Response Platform provides an inherently offensive counterintelligence function. The solution seeks to disrupt and degrade the information-gathering and attack operations an adversary conducts inside the network, while at the same time providing collective counterintelligence functions by helping develop threat and adversary intelligence.

Attivo Labs WannaCry Report

Ransomware attacks continue to be a top threat.

BD and Attivo Networks Provide Visibility and Detection of Cyberattacks on IoT Medical Devices

Collaboration Advances Medical Device Cybersecurity

Attivo Labs Research: Petya/Not Petya Wiper Attack Analysis

Petya wreaks havoc by locking the hard drive MFT and MBR sections and by preventing computers from booting.

ThreatPath™ Attack Path Vulnerability Assessment

The ThreatPath solution provides continuous attack path vulnerability assessment.

Discussion on Deception Webinar

Learn why deception is recognized as a top 2017 security technology to consider for detecting in-network threats.

And That’s a Wrap – Gartner Security and Risk Summit Recap

Written by: Carolyn Crandall, CMO & Chief Deception Officer

BOTsink® Analysis Functions

To help security analysts investigate incidents, gather forensic evidence, and analyze malware, the BOTsink provides the Attack Threat Analysis (ATA) engine and the Malware Analysis Sandbox (MAS).

10 Security Projects CISOs Should Consider: Gartner Analyst

At last week’s Gartner Security Summit in National Harbor, Maryland, Gartner analyst Neil MacDonald outlined 10 cybersecurity projects that could go a long way toward reducing enterprise security risk.

Attivo Networks® ThreatDefend™ Deception and Response Platform Overview

A brief introduction to deception technology and the Attivo Networks ThreatDefend Deception and Response Platform.

Deception in Security Penetration Testing

Attivo challenges Red Team testers to pen test a network equipped with the ThreatDefend™ Deception and Response Platform.

Portfolio Overview

Insight into how deception technology works, Attivo Networks ThreatDefend Deception and Response Platform, and how to detect in-network threats and accelerate incident response.

ThreatStrike™ End-Point Deception Suite

The Attivo ThreatStrike Endpoint solution provides early and accurate detection of targeted attacks on endpoints and servers.

Deception-based Threat Detection Myths and Realities, In Collaboration with NH-ISAC

Discussion on the myths and realities surrounding the effectiveness of deception for advanced threat detection within healthcare organizations.

Deception-based Threat Detection, with a Financial Institution’s Perspective

Engaging Q&A about real world threat detection deployment experiences and reasons why financial services organizations are choosing deception technology.

Threat Deception for the Legal Sector

Legal organizations are actively turning to deception technology as the preferred method for early and accurate detection of threats that have bypassed other security controls. Deception technology gives legal organizations the internal visibility often lacking in traditional security infrastructures. To learn more about what benefits the Attivo solution can offer to the legal sector, see our white paper.

McAfee® Partner Overview

Attivo Networks® has partnered with McAfee® to detect real-time in-network threats and to automate incident response by enabling the automated quarantine of infected endpoints, redirection of potentially malicious traffic, and threat intelligence sharing with other McAfee partners.

At-a-Glance

Brief look into how the Attivo Deception and Response Platform detects in-network threats and accelerates incident response.

Deception Technology—Much more than a Honeypot

This solution brief will detail the origins of honeypots, the logic behind them, and what features ultimately inhibited their universal adoption – followed by a look into what comprises present-day deception technology, how it has evolved, and the functionalities that are catalyzing worldwide deployment and adoption.

2018 TAG Cyber Security Annual-Volume 3

Attivo Networks is a Distinguished Vendor in this year’s 2018 TAG Cyber Security Annual for the second year running.

GDPR with Deceptive Technology Perspective

GDPR is The General Data Protection Regulation which will radically change the data usage and protection landscape when the document comes into force on May 25th, 2018.

Why Deception Technology?

Written by: Tony Cole, Attivo Networks CTO

 

ThreatDirect™ Virtual Deception Scaling

A virtual deception-based detection system that provides deception in remote and branch offices (ROBO).

Myths and Realities of Deception Defenses

In an interview at Information Security Media Group’s recent Healthcare Security Summit Carolyn Crandall discusses the value of deception technology solutions.

Trends at RSAC 2018 and The Rise of Deception Technology

Carolyn Crandall Interviews Tony Cole, Chief Technology Officer of Attivo Networks at RSA Conference 2018. Tony gives advice to CISOs evaluating vendors and shares why deception is a critical security control for outmaneuvering adversaries as they continue to evolve.

Attivo Networks® Behind the Mask Interview with Cybersecurity Expert Sarath Geethakumar

Carolyn Crandall, Chief Deception Officer of Attivo Networks interviews cybersecurity expert Sarath Geethakumar. Sarath shares his experience with deception technology in Attivo Network’s Behind The Mask Series. These videos will reveal the myths and realities of deception technology in a series designed to educate interested parties on the value of deception for threat detection and accelerated incident response.

ThreatOps™ Incident Handling and Response

The ThreatOps™ solution accelerates incident response by adding repeatable playbook functionality to the ThreatDefendTM platform.

Attivo Networks® Behind the Mask Interview with Director of Cybersecurity George Insko

Carolyn Crandall, Chief Deception Officer of Attivo Networks interviews George Insko, Director of Cybersecurity. George shares his experience with deception technology in Attivo Network’s Behind The Mask Series. These videos will reveal the myths and realities of deception technology in a series designed to educate interested parties on the value of deception for threat detection and accelerated incident response.

Attivo Networks® ThreatOps™ Platform

The ThreatOps™ Platform works hand-in-hand with the BOTsink engagement server for in-network threat detection, attack analysis, and acceleration of incident response.

Deception Technology for Financial Institutions

This paper explores challenges faced by financial organizations and how deception technology changes the game on attackers with reliable in-network threat detection and response capabilities.

Effectively Defend Against Insider Threats

It is increasingly important for organizations to be able to identify and stop attacks from within. Whether these threats are from employees, contractors, or suppliers, insider threats start with the advantage of already being inside—often with privileged access to the network and sensitive information.

Attivo Networks® Spotlight Series – What makes Deception Technology Uniquely Valuable

Carolyn Crandall, Chief Deception Officer of Attivo Networks interviews Joseph Salazar, Technical Marketing Engineer in a Showcase Series on the topic of deception technology.

Attivo Networks® Threat Deception For Early Cloud Attack Detection

Attivo Networks® has created solutions for multi-cloud environments including AWS, Azure, Google Cloud, OpenStack, and Oracle Cloud to provide advanced real-time in-the-cloud threat detection with flexible and automated deployments across any number of Virtual Private Clouds (VPCs).

Deception for Enhanced Cloud Security

The Attivo ThreatDefend platform is designed to integrate seamlessly with AWS, OpenStack, and Azure deployments to scale to organization’s cloud needs

Healthcare IoT Device Case Study

HEALTHCARE CUSTOMERS DETECTS INFECTED IOT DEVICES

The Attivo Solution detected malware spreading from IoT medical device that bypassed all existing security controls.

Deception: Advantaged Reality for Detection and Defense

Senior Security Analyst at 451 Research discusses the capabilities derived from sophisticated deception platforms. These products adapt and convert attacker behavioral data into vital detection, intelligence, and offensive capabilities.

 

 

Ovum, On the Radar: Attivo Networks offers deception, vulnerability assessment, and response automation

The ThreatDefend™ portfolio includes all these capabilities.

BOTsink™ Decoys and Engagement Servers

The BOTsink™ solution provides the foundation for the ThreatDefend™ platform, turning the entire network into a trap with a matrix of distributed decoy systems.

Attivo Networks® ThreatPath™ Platform Overview

The Attivo ThreatPath™ solution provides an attack path vulnerability assessment based on likely attack paths that an attacker would traverse through misconfigured systems or credential misuse.

Tony Cole Explains Why CISOs Need to Shift Focus to Detection

Carolyn Crandall, Chief Deception Officer of Attivo Networks Interviews Tony Cole, Chief Technology Officer of Attivo Networks at RSAC 2018. Tony explains why organizations need to shift their focus towards detection to quickly mitigate the risk of breaches and shrink dwell time. Insight is provided on how deception technology empowers cyber defenders with an active defense.

Detection Budgets Rising Fast

Security budgets have shifted and are now split evenly between detection and prevention solutions.

Fox News and Carolyn Crandall Talk Deception Technology

Attivo Networks CMO Carolyn Crandall speaks with FOX News at Black Hat 2017

NBC News The “Hack Back” Bill with Tushar Kothari

Attivo Networks CEO Tushar Kothari explains a proposed bill to allow victims to hack their hackers

Insider Threats: Tackling the Threat Within

Insider threats are an increasing problem for organizations

Smart City Transport Needs Smart Cyber Security Strategies: IoT

Our world has never been more connected than in this day and age.

Petya… Echoes of WannaCry

Does this sound familiar?

New Entries Into The Ransomware Worm Family Detected That Could Prove More Dangerous Than WannaCry

TrendMicro has seen three new entries, UIWIXAdylkuzz and EternalRocks, come onto the scene.

Deception Derails Ransomware: WannaCry Analyzed by Attivo Labs

Attivo Networks Labs analyzed the latest version of the WannaCry ransomware.

Attivo Networks Detects In-Network Attack at Major Petrochemical Company

These activities were missed by all their other internal detection systems.

Attivo Networks® CEO Tushar Kothari Interview with Nasdaq

Tushar Kothari interviews with Nasdaq about Attivo Networks and deception technology

Tony Cole, Attivo Networks CTO, at InfoSec Europe 2018

Tony Cole, Attivo Networks CTO, discusses deception technology at InfoSec Europe in London.

The Benefits of Deception for SCADA Environments

Conventional incident response plans don’t account for SCADA.

New Variant of Shamoon Surfaces, Targets Saudi Arabian Organizations

The end of 2016 saw the return of a familiar attack campaign that wipes the disk of any infected computer.

How Threat Deception Fits Within Your Security Stack

Discussion about real-world threat detection deployment experiences and the reasons why organizations are choosing deception technology.

Attivo Networks® ThreatStrike™ Solution: Endpoint Deception-based Detection

The Attivo ThreatStrike End-Point Deception Solution is a customizable and non-intrusive technology that is used to identify targeted attacks of infected end-points, infected servers/VMs, the use of deception stolen credentials, and ransomware attacks on networked drives. The solution also provides for suspicious email submission for threat detection.

Deception Technology: Changing the Game on Modern-day Attackers (In Collaboration with FS-ISAC)

Learn how deception technology is closing the detection gap and reducing attacker dwell time for financial institutions.

Deception for a SWIFT Defense

The SWIFT network links more than 11,000 financial institutions in more than 200 countries and territories worldwide, and as such, requires a level of trust between member institutions to ensure the integrity of the network. Unfortunately, the SWIFT network has increasingly become a target of attackers over the past few years and traditional security measures are no longer sufficient to deter and stop attackers. This white paper delves into the ways deception technology addresses these challenges.

BBC Recaps Black Hat 2017

BBC recaps the latest in hacker tech at Black Hat, BSides, and Defcon

Introduction to Deception Technology

A brief introduction to deception technology and the Attivo Networks ThreatDefend Deception and Response Platform.

Distributed Deception Platforms for Automating Incident Response

The Attivo Networks ThreatOps Solution enables accelerated incident response capabilities through numerous third-party integrations, automating attack data correlating, and incident response action.

Attivo Networks’ high-fidelity deception platform aims to fool attackers

The company’s deception technology and platform are seeing a significant rise in market profile in 2016. Attivo offers a high signal-to-noise approach to detection, verification, and attacker intelligence.

An Adaptive Cyber Security Threat Defense for Healthcare Organizations

The solution to alleviate the risk of a major breach of patient data is deception technology.

Point-of-Sale System Attacks

Researches the environment of POS device vulnerabilities, how POS attacks happen, the anatomy of a POS attack, and how deception plays a powerful role in protecting against cyber-attacks.

Survey Report: Need for Visibility and Efficiency Drives Rapid Shift to Detection

Survey reveals significant shift in security budgets from prevention devices to detection devices.

Integrating Attivo Networks and Carbon Black – BlackHat 2016

Attivo Networks CMO Carolyn Crandall speaks to the power of the integration between Attivo Networks and Carbon Black.

Deception as a Security Discipline for Advanced Threat Detection and Defense

Will the addition of deception deliver a bona fide return? We believe that deception delivers an effective and efficient defense and will share our rationale in this webinar.

Deception as a Security Discipline – Frost & Sullivan

Written by Michael Suby, Stratecast VP of Research, this report dives into deception as a solution to the most prevalent problems facing cyber security professionals. 

TAG – Distinguished Vendors

Attivo is also honored to be recognized within the report as a Distinguished Vendor for Intrusion Detection Systems.

TAG – Industry Luminary Interviews: Tushar Kothari

Attivo is also honored to be recognized within the report as a Distinguished Vendor for Intrusion Detection Systems.

TAG – Practical Handbook and Reference Guide for the Working Cyber Security Professional

Attivo is also honored to be recognized within the report as a Distinguished Vendor for Intrusion Detection Systems.

Introduction to Attivo Networks at AFCEA West 2017

Introduction to Attivo Networks and deception technology at AFCEA West 2017.

Interview With Tushar Kothari

SiliconANGLE interviews Attivo Networks CEO Tushar Kothari at Juniper Networks NXTWORK 2015.

Introduction to Attivo Networks – RSA 2016

Attivo Networks CMO Carolyn Crandall Introduces Attivo at RSA 2016

SC Magazine Review

“It is, really, a high interaction honeypot on steroids”

Aflac, Inc. Uses Deception for Zero-False-Positives Threat Detection

DJ Goldsworthy, Threat Manager at Aflac, Inc., speaks to the power of deception technology

Aflac, Inc. Uses Deception for Zero-False-Positives Threat Detection

Aflac, Inc. uses deception to stay one step ahead of cyber attackers

The Art of Deception: Todd Holloway Marvell Semiconductor

Todd Holloway of Marvell Semiconductor discusses the Assumed Breach Posture

Attivo Networks Deception Platform for Forensics and Incident Response

Regional healthcare organization inoculates their network against aggressive Qakbot malware

Deception Technology Derails Ransomware Attack on Regional Healthcare Provider

Regional healthcare organization successfully stops the spread of a ransomware attack in their network

Financial Institution Thwarts Penetration Test with Deception

Financial institution uses deception to pass penetration test they failed with other security devices

Major Entertainment Organization Deploys Deception for Insider Threat Visibility

Major entertainment company protects intellectual property from insider and stolen credential attacks

Major Sports Organization Protects Critical Infrastructure With Deception Technology

Major sports organization detects and diverts attack during a live event

Manufacturer Protects Intellectual Property with the Attivo Deception Platform

Semiconductor company uses deception to add visibility into subnets that house their most critical data

Securing Patient Data When Prevention Systems Have Failed with Daniel from Mission Health

InfoSec Professional explains how he used deception technology to stop the aggressive spread of Qakbot

Semiconductor Company Implements Deception to Stop Man-in-the-Middle Attacks

Semiconductor manufacturer adopts deception for real-time Man-in-the-Middle detection

The Attivo BOTsink Platform Integrates with the Blue Coat ProxySG

Attivo Networks integrates with Blue Coat ProxySG

Attivo Networks and Carbon Black Security Platform Integration

Attivo Networks integrates with Carbon Black Security Platform

Attivo Networks and Palo Alto Networks

Attivo Networks integrates with Palo Alto Networks Next-Generation Firewall

Attivo Networks Deception Platform Integrates with Cisco pxGrid Simplifying Detection and Incident Response

Attivo Networks integrates with Cisco pxGrid

Attivo Networks Deception Platform Integration with Forescout CounterACT®

Attivo Networks integrates with Forescout CounterACT®

Attivo Networks Deception Platform and McAfee NSP Integration DNS Sinkhole with URL Sandboxing

Attivo Networks integrates with McAfee DNS sinkhole

Attivo Networks Deception Platform Integrates with the Check Point Management Server

Attivo Networks integrates with Check Point Management Server

Detect Infected Machines and Stop Data Exfiltration with Attivo Deception Platform and Juniper SRX Firewalls

Attivo Networks integrates with Juniper SRX Firewalls

Attivo Networks Partner Integrations for an Active Defense

Deception technology in the cyber security eco-system

Checklist for Evaluating Deception Platforms

What deception technology is and how it provides an effective solution for detecting in-network threats in real-time.

How to Evaluate Deception Platforms and Checklist

An in-depth answer to the questions surrounding deception technology

Deception for Attack Detection of IoT Devices

This document will address the security concerns with the latest in security for connected devices—deception technology.

Defense in Depth in the Amazon Web Servcies Cloud

The security challenges within AWS environments and creating a defense in depth using deception technology.

Enhancing AWS Cloud Security with Deception Technology

How to get real-time visibility inside the data center on a shared security model.

Dynamic Deception for Industrial Control Systems

How deception-based threat detection helps energy facilities dramatically increase the speed threats are uncovered.

Injecting Real-time Cyber Attack Detection into SCADA Networks

Learn about defense in-depth for SCADA networks and closing the gaps left by current security infrastructure solutions.

Harnessing Unparalleled Visibility in Cyber Attack Investigations

Demo of advanced forensic analysis, reporting, and how prevention system integrations expedite remediation.

Know What is Lurking in Your Network

Find out how deception technology allows for in-network detection of advanced threats.

What’s Lurking Deep in Your Network

Advanced techniques for finding malware lurking in corporate domains, remote offices, data centers, and in the cloud.

Leveraging Deception for Visibility

Addresses the different threat vectors affecting organizations and real use cases for in-network threat detection with deception.

Pre-emptive Spear Phishing Management

Learn why phishing is one of the top cyber attacks occurring, how it works, and the steps an organization can take to protect their employees.

The Role of Dynamic Deception in the Cyber Kill Chain

Learn about the challenges of today’s threat landscape and the opportunities to address holes in the cyber attack lifecycle.

How to Avoid Common Healthcare data Security Challenges

How Healthcare Companies can avoid common security challenges by not relying on just HIPAA compliance for data security.

Dear Locky: You have shown that signature-based detection is fundamentally impossible, but we still caught you!

Deception technology: catching the uncatchable

Deception Technology Comes of Age

What does it mean to be more than just a DecoyDoc?

Does Hillary, Bernie, Donald, or You Hold the Greatest Risk for being a Cyberattack Victim this Election Season

Deception as a solution to IoT security gaps

Healthcare Industry Under Attack… Nasty Strain of Malware Resurfaces and Challenges Security Operations Team with

What healthcare security operations teams can do to better defend their companies

Information Security: A Corporate Responsibility that goes beyond the CISO

Going beyond the CISO

Legal Settlements Could Place More Urgency On Healthcare Security

The cost of poor healthcare security might have just gotten more expensive.

National Health IT Week, Don’t Forget to Focus on Cyber Security

How can the most targeted industry protect themselves from cyber threats?

New Attacks Highlight Need for a New Approach to Cyber Protection

Are current prevention techniques enough to stop modern cyber threats?

Our Critical Infrastructure Safety, a Cautionary Tale

Is the U.S. prepared for a major cyber attack on critical infrastructure?

Ransomware… Because That’s Where the Money Is

As more cyber criminals flock to “where the money is”, how will you protect yourself?

Smart City Transport Needs Smart Cyber Security Strategies: IoT

As connectivity increases, how can we be sure that these devices are secure?

Uncertainty as a Goal of Deception in Cyber Security

“Enterprise cyber security teams must begin accelerating the use of deception in their infrastructure”

What Brexit Means for the Cyber Security Industry

Brexit: Contributor to the shrinking cyber security labor pool?


Ovum Research Report Overview and Analyst Perspectives

Rik Turner, Principal Analyst at Ovum and Carolyn Crandall, CMO from Attivo Networks engage in an interactive discussion on the changes in security detection technology trends.

Deception for Mergers & Acquisitions

When an acquisition is announced, both organizations experience an increase in target profiles and public visibility. This typically results in both organizations making themselves targets of increased cyber threats and attacks.

Black Hat 2018: Election Hacking, Active Defense, and More…

Written by: Carolyn Crandall, CMO and Chief Deception Officer

Attivo Networks® DecoyDocs Datasheet

The ThreatDefend Deception and Response Platform provides an inherently offensive counterintelligence function. The solution seeks to disrupt and degrade the information-gathering and attack operations an adversary conducts inside the network, while at the same time providing collective counterintelligence functions by helping develop threat and adversary intelligence.

Attivo Labs WannaCry Report

Ransomware attacks continue to be a top threat.

BD and Attivo Networks Provide Visibility and Detection of Cyberattacks on IoT Medical Devices

Collaboration Advances Medical Device Cybersecurity

Attivo Labs Research: Petya/Not Petya Wiper Attack Analysis

Petya wreaks havoc by locking the hard drive MFT and MBR sections and by preventing computers from booting.

ThreatPath™ Attack Path Vulnerability Assessment

The ThreatPath solution provides continuous attack path vulnerability assessment.

Discussion on Deception Webinar

Learn why deception is recognized as a top 2017 security technology to consider for detecting in-network threats.

And That’s a Wrap – Gartner Security and Risk Summit Recap

Written by: Carolyn Crandall, CMO & Chief Deception Officer

BOTsink® Analysis Functions

To help security analysts investigate incidents, gather forensic evidence, and analyze malware, the BOTsink provides the Attack Threat Analysis (ATA) engine and the Malware Analysis Sandbox (MAS).

10 Security Projects CISOs Should Consider: Gartner Analyst

At last week’s Gartner Security Summit in National Harbor, Maryland, Gartner analyst Neil MacDonald outlined 10 cybersecurity projects that could go a long way toward reducing enterprise security risk.

Attivo Networks® ThreatDefend™ Deception and Response Platform Overview

A brief introduction to deception technology and the Attivo Networks ThreatDefend Deception and Response Platform.

Deception in Security Penetration Testing

Attivo challenges Red Team testers to pen test a network equipped with the ThreatDefend™ Deception and Response Platform.

Portfolio Overview

Insight into how deception technology works, Attivo Networks ThreatDefend Deception and Response Platform, and how to detect in-network threats and accelerate incident response.

ThreatStrike™ End-Point Deception Suite

The Attivo ThreatStrike Endpoint solution provides early and accurate detection of targeted attacks on endpoints and servers.

Deception-based Threat Detection Myths and Realities, In Collaboration with NH-ISAC

Discussion on the myths and realities surrounding the effectiveness of deception for advanced threat detection within healthcare organizations.

Deception-based Threat Detection, with a Financial Institution’s Perspective

Engaging Q&A about real world threat detection deployment experiences and reasons why financial services organizations are choosing deception technology.

Threat Deception for the Legal Sector

Legal organizations are actively turning to deception technology as the preferred method for early and accurate detection of threats that have bypassed other security controls. Deception technology gives legal organizations the internal visibility often lacking in traditional security infrastructures. To learn more about what benefits the Attivo solution can offer to the legal sector, see our white paper.

McAfee® Partner Overview

Attivo Networks® has partnered with McAfee® to detect real-time in-network threats and to automate incident response by enabling the automated quarantine of infected endpoints, redirection of potentially malicious traffic, and threat intelligence sharing with other McAfee partners.

At-a-Glance

Brief look into how the Attivo Deception and Response Platform detects in-network threats and accelerates incident response.

Deception Technology—Much more than a Honeypot

This solution brief will detail the origins of honeypots, the logic behind them, and what features ultimately inhibited their universal adoption – followed by a look into what comprises present-day deception technology, how it has evolved, and the functionalities that are catalyzing worldwide deployment and adoption.

2018 TAG Cyber Security Annual-Volume 3

Attivo Networks is a Distinguished Vendor in this year’s 2018 TAG Cyber Security Annual for the second year running.

GDPR with Deceptive Technology Perspective

GDPR is The General Data Protection Regulation which will radically change the data usage and protection landscape when the document comes into force on May 25th, 2018.

Why Deception Technology?

Written by: Tony Cole, Attivo Networks CTO

 

ThreatDirect™ Virtual Deception Scaling

A virtual deception-based detection system that provides deception in remote and branch offices (ROBO).

Myths and Realities of Deception Defenses

In an interview at Information Security Media Group’s recent Healthcare Security Summit Carolyn Crandall discusses the value of deception technology solutions.

Trends at RSAC 2018 and The Rise of Deception Technology

Carolyn Crandall Interviews Tony Cole, Chief Technology Officer of Attivo Networks at RSA Conference 2018. Tony gives advice to CISOs evaluating vendors and shares why deception is a critical security control for outmaneuvering adversaries as they continue to evolve.

Attivo Networks® Behind the Mask Interview with Cybersecurity Expert Sarath Geethakumar

Carolyn Crandall, Chief Deception Officer of Attivo Networks interviews cybersecurity expert Sarath Geethakumar. Sarath shares his experience with deception technology in Attivo Network’s Behind The Mask Series. These videos will reveal the myths and realities of deception technology in a series designed to educate interested parties on the value of deception for threat detection and accelerated incident response.

ThreatOps™ Incident Handling and Response

The ThreatOps™ solution accelerates incident response by adding repeatable playbook functionality to the ThreatDefendTM platform.

Attivo Networks® Behind the Mask Interview with Director of Cybersecurity George Insko

Carolyn Crandall, Chief Deception Officer of Attivo Networks interviews George Insko, Director of Cybersecurity. George shares his experience with deception technology in Attivo Network’s Behind The Mask Series. These videos will reveal the myths and realities of deception technology in a series designed to educate interested parties on the value of deception for threat detection and accelerated incident response.

Attivo Networks® ThreatOps™ Platform

The ThreatOps™ Platform works hand-in-hand with the BOTsink engagement server for in-network threat detection, attack analysis, and acceleration of incident response.

Deception Technology for Financial Institutions

This paper explores challenges faced by financial organizations and how deception technology changes the game on attackers with reliable in-network threat detection and response capabilities.

Effectively Defend Against Insider Threats

It is increasingly important for organizations to be able to identify and stop attacks from within. Whether these threats are from employees, contractors, or suppliers, insider threats start with the advantage of already being inside—often with privileged access to the network and sensitive information.

Attivo Networks® Spotlight Series – What makes Deception Technology Uniquely Valuable

Carolyn Crandall, Chief Deception Officer of Attivo Networks interviews Joseph Salazar, Technical Marketing Engineer in a Showcase Series on the topic of deception technology.

Attivo Networks® Threat Deception For Early Cloud Attack Detection

Attivo Networks® has created solutions for multi-cloud environments including AWS, Azure, Google Cloud, OpenStack, and Oracle Cloud to provide advanced real-time in-the-cloud threat detection with flexible and automated deployments across any number of Virtual Private Clouds (VPCs).

Deception for Enhanced Cloud Security

The Attivo ThreatDefend platform is designed to integrate seamlessly with AWS, OpenStack, and Azure deployments to scale to organization’s cloud needs

Healthcare IoT Device Case Study

HEALTHCARE CUSTOMERS DETECTS INFECTED IOT DEVICES

The Attivo Solution detected malware spreading from IoT medical device that bypassed all existing security controls.

Deception: Advantaged Reality for Detection and Defense

Senior Security Analyst at 451 Research discusses the capabilities derived from sophisticated deception platforms. These products adapt and convert attacker behavioral data into vital detection, intelligence, and offensive capabilities.

 

 

Ovum, On the Radar: Attivo Networks offers deception, vulnerability assessment, and response automation

The ThreatDefend™ portfolio includes all these capabilities.

BOTsink™ Decoys and Engagement Servers

The BOTsink™ solution provides the foundation for the ThreatDefend™ platform, turning the entire network into a trap with a matrix of distributed decoy systems.

Attivo Networks® ThreatPath™ Platform Overview

The Attivo ThreatPath™ solution provides an attack path vulnerability assessment based on likely attack paths that an attacker would traverse through misconfigured systems or credential misuse.

Tony Cole Explains Why CISOs Need to Shift Focus to Detection

Carolyn Crandall, Chief Deception Officer of Attivo Networks Interviews Tony Cole, Chief Technology Officer of Attivo Networks at RSAC 2018. Tony explains why organizations need to shift their focus towards detection to quickly mitigate the risk of breaches and shrink dwell time. Insight is provided on how deception technology empowers cyber defenders with an active defense.

Detection Budgets Rising Fast

Security budgets have shifted and are now split evenly between detection and prevention solutions.

Fox News and Carolyn Crandall Talk Deception Technology

Attivo Networks CMO Carolyn Crandall speaks with FOX News at Black Hat 2017

NBC News The “Hack Back” Bill with Tushar Kothari

Attivo Networks CEO Tushar Kothari explains a proposed bill to allow victims to hack their hackers

Insider Threats: Tackling the Threat Within

Insider threats are an increasing problem for organizations

Smart City Transport Needs Smart Cyber Security Strategies: IoT

Our world has never been more connected than in this day and age.

Petya… Echoes of WannaCry

Does this sound familiar?

New Entries Into The Ransomware Worm Family Detected That Could Prove More Dangerous Than WannaCry

TrendMicro has seen three new entries, UIWIXAdylkuzz and EternalRocks, come onto the scene.

Deception Derails Ransomware: WannaCry Analyzed by Attivo Labs

Attivo Networks Labs analyzed the latest version of the WannaCry ransomware.

Attivo Networks Detects In-Network Attack at Major Petrochemical Company

These activities were missed by all their other internal detection systems.

Attivo Networks® CEO Tushar Kothari Interview with Nasdaq

Tushar Kothari interviews with Nasdaq about Attivo Networks and deception technology

Tony Cole, Attivo Networks CTO, at InfoSec Europe 2018

Tony Cole, Attivo Networks CTO, discusses deception technology at InfoSec Europe in London.

The Benefits of Deception for SCADA Environments

Conventional incident response plans don’t account for SCADA.

New Variant of Shamoon Surfaces, Targets Saudi Arabian Organizations

The end of 2016 saw the return of a familiar attack campaign that wipes the disk of any infected computer.

How Threat Deception Fits Within Your Security Stack

Discussion about real-world threat detection deployment experiences and the reasons why organizations are choosing deception technology.

Attivo Networks® ThreatStrike™ Solution: Endpoint Deception-based Detection

The Attivo ThreatStrike End-Point Deception Solution is a customizable and non-intrusive technology that is used to identify targeted attacks of infected end-points, infected servers/VMs, the use of deception stolen credentials, and ransomware attacks on networked drives. The solution also provides for suspicious email submission for threat detection.

Deception Technology: Changing the Game on Modern-day Attackers (In Collaboration with FS-ISAC)

Learn how deception technology is closing the detection gap and reducing attacker dwell time for financial institutions.

Deception for a SWIFT Defense

The SWIFT network links more than 11,000 financial institutions in more than 200 countries and territories worldwide, and as such, requires a level of trust between member institutions to ensure the integrity of the network. Unfortunately, the SWIFT network has increasingly become a target of attackers over the past few years and traditional security measures are no longer sufficient to deter and stop attackers. This white paper delves into the ways deception technology addresses these challenges.

BBC Recaps Black Hat 2017

BBC recaps the latest in hacker tech at Black Hat, BSides, and Defcon

Introduction to Deception Technology

A brief introduction to deception technology and the Attivo Networks ThreatDefend Deception and Response Platform.

Distributed Deception Platforms for Automating Incident Response

The Attivo Networks ThreatOps Solution enables accelerated incident response capabilities through numerous third-party integrations, automating attack data correlating, and incident response action.

Attivo Networks’ high-fidelity deception platform aims to fool attackers

The company’s deception technology and platform are seeing a significant rise in market profile in 2016. Attivo offers a high signal-to-noise approach to detection, verification, and attacker intelligence.

An Adaptive Cyber Security Threat Defense for Healthcare Organizations

The solution to alleviate the risk of a major breach of patient data is deception technology.

Point-of-Sale System Attacks

Researches the environment of POS device vulnerabilities, how POS attacks happen, the anatomy of a POS attack, and how deception plays a powerful role in protecting against cyber-attacks.

Survey Report: Need for Visibility and Efficiency Drives Rapid Shift to Detection

Survey reveals significant shift in security budgets from prevention devices to detection devices.

Integrating Attivo Networks and Carbon Black – BlackHat 2016

Attivo Networks CMO Carolyn Crandall speaks to the power of the integration between Attivo Networks and Carbon Black.

Deception as a Security Discipline for Advanced Threat Detection and Defense

Will the addition of deception deliver a bona fide return? We believe that deception delivers an effective and efficient defense and will share our rationale in this webinar.

Deception as a Security Discipline – Frost & Sullivan

Written by Michael Suby, Stratecast VP of Research, this report dives into deception as a solution to the most prevalent problems facing cyber security professionals. 

TAG – Distinguished Vendors

Attivo is also honored to be recognized within the report as a Distinguished Vendor for Intrusion Detection Systems.

TAG – Industry Luminary Interviews: Tushar Kothari

Attivo is also honored to be recognized within the report as a Distinguished Vendor for Intrusion Detection Systems.

TAG – Practical Handbook and Reference Guide for the Working Cyber Security Professional

Attivo is also honored to be recognized within the report as a Distinguished Vendor for Intrusion Detection Systems.

Introduction to Attivo Networks at AFCEA West 2017

Introduction to Attivo Networks and deception technology at AFCEA West 2017.

Interview With Tushar Kothari

SiliconANGLE interviews Attivo Networks CEO Tushar Kothari at Juniper Networks NXTWORK 2015.

Introduction to Attivo Networks – RSA 2016

Attivo Networks CMO Carolyn Crandall Introduces Attivo at RSA 2016

SC Magazine Review

“It is, really, a high interaction honeypot on steroids”

Aflac, Inc. Uses Deception for Zero-False-Positives Threat Detection

DJ Goldsworthy, Threat Manager at Aflac, Inc., speaks to the power of deception technology

Aflac, Inc. Uses Deception for Zero-False-Positives Threat Detection

Aflac, Inc. uses deception to stay one step ahead of cyber attackers

The Art of Deception: Todd Holloway Marvell Semiconductor

Todd Holloway of Marvell Semiconductor discusses the Assumed Breach Posture

Attivo Networks Deception Platform for Forensics and Incident Response

Regional healthcare organization inoculates their network against aggressive Qakbot malware

Deception Technology Derails Ransomware Attack on Regional Healthcare Provider

Regional healthcare organization successfully stops the spread of a ransomware attack in their network

Financial Institution Thwarts Penetration Test with Deception

Financial institution uses deception to pass penetration test they failed with other security devices

Major Entertainment Organization Deploys Deception for Insider Threat Visibility

Major entertainment company protects intellectual property from insider and stolen credential attacks

Major Sports Organization Protects Critical Infrastructure With Deception Technology

Major sports organization detects and diverts attack during a live event

Manufacturer Protects Intellectual Property with the Attivo Deception Platform

Semiconductor company uses deception to add visibility into subnets that house their most critical data

Securing Patient Data When Prevention Systems Have Failed with Daniel from Mission Health

InfoSec Professional explains how he used deception technology to stop the aggressive spread of Qakbot

Semiconductor Company Implements Deception to Stop Man-in-the-Middle Attacks

Semiconductor manufacturer adopts deception for real-time Man-in-the-Middle detection

The Attivo BOTsink Platform Integrates with the Blue Coat ProxySG

Attivo Networks integrates with Blue Coat ProxySG

Attivo Networks and Carbon Black Security Platform Integration

Attivo Networks integrates with Carbon Black Security Platform

Attivo Networks and Palo Alto Networks

Attivo Networks integrates with Palo Alto Networks Next-Generation Firewall

Attivo Networks Deception Platform Integrates with Cisco pxGrid Simplifying Detection and Incident Response

Attivo Networks integrates with Cisco pxGrid

Attivo Networks Deception Platform Integration with Forescout CounterACT®

Attivo Networks integrates with Forescout CounterACT®

Attivo Networks Deception Platform and McAfee NSP Integration DNS Sinkhole with URL Sandboxing

Attivo Networks integrates with McAfee DNS sinkhole

Attivo Networks Deception Platform Integrates with the Check Point Management Server

Attivo Networks integrates with Check Point Management Server

Detect Infected Machines and Stop Data Exfiltration with Attivo Deception Platform and Juniper SRX Firewalls

Attivo Networks integrates with Juniper SRX Firewalls

Attivo Networks Partner Integrations for an Active Defense

Deception technology in the cyber security eco-system

Checklist for Evaluating Deception Platforms

What deception technology is and how it provides an effective solution for detecting in-network threats in real-time.

How to Evaluate Deception Platforms and Checklist

An in-depth answer to the questions surrounding deception technology

Deception for Attack Detection of IoT Devices

This document will address the security concerns with the latest in security for connected devices—deception technology.

Defense in Depth in the Amazon Web Servcies Cloud

The security challenges within AWS environments and creating a defense in depth using deception technology.

Enhancing AWS Cloud Security with Deception Technology

How to get real-time visibility inside the data center on a shared security model.

Dynamic Deception for Industrial Control Systems

How deception-based threat detection helps energy facilities dramatically increase the speed threats are uncovered.

Injecting Real-time Cyber Attack Detection into SCADA Networks

Learn about defense in-depth for SCADA networks and closing the gaps left by current security infrastructure solutions.

Harnessing Unparalleled Visibility in Cyber Attack Investigations

Demo of advanced forensic analysis, reporting, and how prevention system integrations expedite remediation.

Know What is Lurking in Your Network

Find out how deception technology allows for in-network detection of advanced threats.

What’s Lurking Deep in Your Network

Advanced techniques for finding malware lurking in corporate domains, remote offices, data centers, and in the cloud.

Leveraging Deception for Visibility

Addresses the different threat vectors affecting organizations and real use cases for in-network threat detection with deception.

Pre-emptive Spear Phishing Management

Learn why phishing is one of the top cyber attacks occurring, how it works, and the steps an organization can take to protect their employees.

The Role of Dynamic Deception in the Cyber Kill Chain

Learn about the challenges of today’s threat landscape and the opportunities to address holes in the cyber attack lifecycle.

How to Avoid Common Healthcare data Security Challenges

How Healthcare Companies can avoid common security challenges by not relying on just HIPAA compliance for data security.

Dear Locky: You have shown that signature-based detection is fundamentally impossible, but we still caught you!

Deception technology: catching the uncatchable

Deception Technology Comes of Age

What does it mean to be more than just a DecoyDoc?

Does Hillary, Bernie, Donald, or You Hold the Greatest Risk for being a Cyberattack Victim this Election Season

Deception as a solution to IoT security gaps

Healthcare Industry Under Attack… Nasty Strain of Malware Resurfaces and Challenges Security Operations Team with

What healthcare security operations teams can do to better defend their companies

Information Security: A Corporate Responsibility that goes beyond the CISO

Going beyond the CISO

Legal Settlements Could Place More Urgency On Healthcare Security

The cost of poor healthcare security might have just gotten more expensive.

National Health IT Week, Don’t Forget to Focus on Cyber Security

How can the most targeted industry protect themselves from cyber threats?

New Attacks Highlight Need for a New Approach to Cyber Protection

Are current prevention techniques enough to stop modern cyber threats?

Our Critical Infrastructure Safety, a Cautionary Tale

Is the U.S. prepared for a major cyber attack on critical infrastructure?

Ransomware… Because That’s Where the Money Is

As more cyber criminals flock to “where the money is”, how will you protect yourself?

Smart City Transport Needs Smart Cyber Security Strategies: IoT

As connectivity increases, how can we be sure that these devices are secure?