Support Login

For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

If you agree to these terms, please click here.

 

Resource Center

Welcome to the Attivo Resource Center. Here you will find resources to learn more about Attivo and Attivo threat detection solutions.

  • Categories

  • Format

Attivo Networks® DecoyDocs Datasheet

The ThreatDefend Deception and Response Platform provides an inherently offensive counterintelligence function. The solution seeks to disrupt and degrade the information-gathering and attack operations an adversary conducts inside the network, while at the same time providing collective counterintelligence functions by helping develop threat and adversary intelligence.

Attivo Networks® ThreatDefend™ Deception and Response Platform Overview

A brief introduction to deception technology and the Attivo Networks ThreatDefend Deception and Response Platform.

Portfolio Overview

Insight into how deception technology works, Attivo Networks ThreatDefend Deception and Response Platform, and how to detect in-network threats and accelerate incident response.

Threat Deception for the Legal Sector

Legal organizations are actively turning to deception technology as the preferred method for early and accurate detection of threats that have bypassed other security controls. Deception technology gives legal organizations the internal visibility often lacking in traditional security infrastructures. To learn more about what benefits the Attivo solution can offer to the legal sector, see our white paper.

At-a-Glance

Brief look into how the Attivo Deception and Response Platform detects in-network threats and accelerates incident response.

Attivo Networks® ThreatOps™ Platform

The ThreatOps™ Platform works hand-in-hand with the BOTsink engagement server for in-network threat detection, attack analysis, and acceleration of incident response.

Attivo Networks® Spotlight Series – What makes Deception Technology Uniquely Valuable

Carolyn Crandall, Chief Deception Officer of Attivo Networks interviews Joseph Salazar, Technical Marketing Engineer in a Showcase Series on the topic of deception technology.

Attivo Networks® ThreatPath™ Platform Overview

The Attivo ThreatPath™ solution provides an attack path vulnerability assessment based on likely attack paths that an attacker would traverse through misconfigured systems or credential misuse.

Tony Cole Explains Why CISOs Need to Shift Focus to Detection

Carolyn Crandall, Chief Deception Officer of Attivo Networks Interviews Tony Cole, Chief Technology Officer of Attivo Networks at RSAC 2018. Tony explains why organizations need to shift their focus towards detection to quickly mitigate the risk of breaches and shrink dwell time. Insight is provided on how deception technology empowers cyber defenders with an active defense.

Attivo Networks® ThreatStrike™ Solution: Endpoint Deception-based Detection

The Attivo ThreatStrike End-Point Deception Solution is a customizable and non-intrusive technology that is used to identify targeted attacks of infected end-points, infected servers/VMs, the use of deception stolen credentials, and ransomware attacks on networked drives. The solution also provides for suspicious email submission for threat detection.

BBC Recaps Black Hat 2017

BBC recaps the latest in hacker tech at Black Hat, BSides, and Defcon

Introduction to Deception Technology

A brief introduction to deception technology and the Attivo Networks ThreatDefend Deception and Response Platform.

Integrating Attivo Networks and Carbon Black – BlackHat 2016

Attivo Networks CMO Carolyn Crandall speaks to the power of the integration between Attivo Networks and Carbon Black.

Introduction to Attivo Networks at AFCEA West 2017

Introduction to Attivo Networks and deception technology at AFCEA West 2017.

Harnessing Unparalleled Visibility in Cyber Attack Investigations

Demo of advanced forensic analysis, reporting, and how prevention system integrations expedite remediation.

Does Hillary, Bernie, Donald, or You Hold the Greatest Risk for being a Cyberattack Victim this Election Season

Deception as a solution to IoT security gaps

What Brexit Means for the Cyber Security Industry

Brexit: Contributor to the shrinking cyber security labor pool?


Attivo Networks® DecoyDocs Datasheet

The ThreatDefend Deception and Response Platform provides an inherently offensive counterintelligence function. The solution seeks to disrupt and degrade the information-gathering and attack operations an adversary conducts inside the network, while at the same time providing collective counterintelligence functions by helping develop threat and adversary intelligence.

Attivo Networks® ThreatDefend™ Deception and Response Platform Overview

A brief introduction to deception technology and the Attivo Networks ThreatDefend Deception and Response Platform.

Portfolio Overview

Insight into how deception technology works, Attivo Networks ThreatDefend Deception and Response Platform, and how to detect in-network threats and accelerate incident response.

Threat Deception for the Legal Sector

Legal organizations are actively turning to deception technology as the preferred method for early and accurate detection of threats that have bypassed other security controls. Deception technology gives legal organizations the internal visibility often lacking in traditional security infrastructures. To learn more about what benefits the Attivo solution can offer to the legal sector, see our white paper.

At-a-Glance

Brief look into how the Attivo Deception and Response Platform detects in-network threats and accelerates incident response.

Attivo Networks® ThreatOps™ Platform

The ThreatOps™ Platform works hand-in-hand with the BOTsink engagement server for in-network threat detection, attack analysis, and acceleration of incident response.

Attivo Networks® Spotlight Series – What makes Deception Technology Uniquely Valuable

Carolyn Crandall, Chief Deception Officer of Attivo Networks interviews Joseph Salazar, Technical Marketing Engineer in a Showcase Series on the topic of deception technology.

Attivo Networks® ThreatPath™ Platform Overview

The Attivo ThreatPath™ solution provides an attack path vulnerability assessment based on likely attack paths that an attacker would traverse through misconfigured systems or credential misuse.

Tony Cole Explains Why CISOs Need to Shift Focus to Detection

Carolyn Crandall, Chief Deception Officer of Attivo Networks Interviews Tony Cole, Chief Technology Officer of Attivo Networks at RSAC 2018. Tony explains why organizations need to shift their focus towards detection to quickly mitigate the risk of breaches and shrink dwell time. Insight is provided on how deception technology empowers cyber defenders with an active defense.

Attivo Networks® ThreatStrike™ Solution: Endpoint Deception-based Detection

The Attivo ThreatStrike End-Point Deception Solution is a customizable and non-intrusive technology that is used to identify targeted attacks of infected end-points, infected servers/VMs, the use of deception stolen credentials, and ransomware attacks on networked drives. The solution also provides for suspicious email submission for threat detection.

BBC Recaps Black Hat 2017

BBC recaps the latest in hacker tech at Black Hat, BSides, and Defcon

Introduction to Deception Technology

A brief introduction to deception technology and the Attivo Networks ThreatDefend Deception and Response Platform.

Integrating Attivo Networks and Carbon Black – BlackHat 2016

Attivo Networks CMO Carolyn Crandall speaks to the power of the integration between Attivo Networks and Carbon Black.

Introduction to Attivo Networks at AFCEA West 2017

Introduction to Attivo Networks and deception technology at AFCEA West 2017.

Harnessing Unparalleled Visibility in Cyber Attack Investigations

Demo of advanced forensic analysis, reporting, and how prevention system integrations expedite remediation.

Does Hillary, Bernie, Donald, or You Hold the Greatest Risk for being a Cyberattack Victim this Election Season

Deception as a solution to IoT security gaps

What Brexit Means for the Cyber Security Industry

Brexit: Contributor to the shrinking cyber security labor pool?