• Categories

  • Format

At-a-Glance

Attivo Networks for Enterprise Identity Protection and Lateral Movement Detection

Choosing an Active Directory Visibility Solution

The Attivo ThreatStrike® component of the Endpoint Detection Net (EDN) suite provides customizable and nonintrusive credential protection and early detection of targeted attacks on endpoints and servers.

eWeek: How ADAssessor Brings Visibility to AD Attack Surfaces

Evaluation and commentary by Frank J. Ohlhorst, award-winning technology journalist and IT industry analyst.

Attivo Networks Fact Sheet

Attivo Networks®, the leader in deception for cybersecurity defense, provides a comprehensive deception-based platform designed for early and accurate detection of external or internal threats using any lateral movement attack method…

Portfolio Overview

Comprehensive detection for empowering the defender and eliminating the attacker’s advantage.

Attivo Networks ThreatDefend® Platform Overview

Learn about what the ThreatDefend Platform can offer in this short 65 second video overview.

Disrupt an Attacker’s Ability to Discover Networks and Move Laterally with Deflect

This white paper discusses key use cases of the Endpoint Detection Net’s Deflect function that prevent attackers from fingerprinting an endpoint to identify security weaknesses and conducting reconnaissance.

ADAssessor for Continuous Visibility to Active Directory Exposures & Live Attacks

The ADAssessor solution is a standalone offering that provides continuous visibility to AD exposures vulnerable to attack and detects advanced Active Directory attacks in real-time.

InSecurity: Using Deception to Safeguard the Trut‪h‬

Matt Stephenson welcomes Attivo Networks CTO Tony Cole to InSecurity for chat about the role deception techniques play in security. But that’s not all… we get into how the privatization of space will impact cybersecurity… where cybersecurity fits into Black Swan events like the Wall Street Bets brouhaha… even a bit of Pink Floyd works into the mix!

Active Directory Protection Animated Video

Active Directory, which is used to authenticate and authorize services, is notoriously difficult to protect. Virtually every employee needs some level of access to its data and, all too frequently, it is either misconfigured or overprovisioned, making it a prime attacker target.

BOTsink® Deception and Decoy Technology for Threat Detection

The Attivo Networks BOTsink® solution stands guard inside your network, using high-interaction deception and decoy technology to lure attackers into engaging and revealing themselves. Through misdirection of the attack, organizations gain the advantage of time to detect, analyze, and stop an attacker.

SC Media ThreatDefend Platform v5.0 Review

Security pros will find the Attivo ThreatDefend Platform a comprehensive detection product that uses machine learning to customize decoys based on the systems, applications, and environments into which it has been deployed and adds endpoint components to hide data and deflect port and service scans to decoys…

Attivo Networks ThreatPath Cyber Hygiene & Attack Surface Reduction

The Attivo ThreatPath® solution, part of the modular ThreatDefend Endpoint Detection Net family of products, provides continuous attack surface monitoring, reduces attack paths, and improves organizations’ cyber hygiene.

Deflect Attacks with the Endpoint Detection Net Suite

The EDN Deflect function brings a needed capability to make every endpoint a part of the deception fabric. By denying attackers the ability to collect accurate information on their targets and disrupt their ability to move laterally undetected, the Deflect function gives organizations an early warning and an active defense against malicious East/ West traffic to increase their security posture and catch attackers early in the attack cycle.

Scaling Detection with the ThreatDirect Solution

It is critical to have visibility across the entire network with no gaps based on location or resource limitations. With the ThreatDirect solution, organizations can now scale their adaptive defense across remote areas of their network with full-featured deception-based detection, automated attack analysis, and accelerated incident response capabilities.

9 Notable 2020 CISO Challenges – Are they the Same as Yours?

The world has changed in so many ways in 2020. Even with the best-laid plans and precautions, CISOs have had to quickly respond to the COVID-19 pandemic, revising strategies and transitioning from unprepared to prepared. Read on for a list of important things CISOs are tackling as they look to stay one step ahead in these rapidly changing times.

Behind the Scenes with Attivo Networks

Go behind the scenes with CEO, Tushar Kothari, CTO, Tony Cole, and CMO & Chief Deception Officer, Carolyn Crandall as they discuss the state of cybersecurity, the value of deception-based threat detection, and more.

Customer Experiences in Real-World Deception Deployments

In this webinar, you will have the unique opportunity to hear from three behind-the-mask security practitioners who are actively using Attivo Networks deception technology in very different environments.

Detecting the Deceivers through Deception

In this session we discuss deception tactics that defenders can use on adversaries to gain fast and high-fidelity detection across an enterprise. Hear why this defensive fight is relevant to companies large and small, regardless of security capability maturity.

How Deception is Shaping our Future

How are we using deception, and where could we be more effective, including a look towards the future of this technology and where/how to apply it.

 

Deception Technology in 2020 – ISMG Interview

Deception technology has moved from being an emerging technology to a more mainstream security control, say Tony Cole, CTO, and Carolyn Crandall, chief deception officer and chief marketing officer, at Attivo Networks.

RSA 2020 – Endpoint Detection Net

Recording from Broadcast Ally at RSA 2020, Carolyn Crandall and Tony Cole sit down to discuss Attivo Networks’ newest product announcement: Endpoint Detection Net, which tackles endpoint security challenges head-on by making every endpoint a decoy designed to disrupt an attacker’s ability to break out and further infiltrate the network.

RSA 2020 – Attivo Networks Deception-Based Threat Detection

Recording from Broadcast Ally at RSA 2020, Carolyn Crandall and Tony Cole sit down to discuss Attivo Networks deception technology and all that it offers.

Deception Technology: Active Defense to Combat Advanced Threats

Attivo Networks deception technology provides the most authentic and comprehensive solution for detecting threats early in the attack lifecycle. Organizations shifting to an offensive posture will simplify detection operations and gain the critical tools they need to improve their security posture in the war against cyber attackers.

German Webinar: Deception, die bessere Methode Widersacher zu erkennen!

Trotz steigender Ausgaben für Cybersecurity nehmen Anzahl und Ausmaß von Breaches zu. Darüber hinaus bleibt die Zeitspanne bis zur Entdeckung eines Einbruchs immer noch sehr hoch mit fast 78 Tagen im globalen Durchschnitt. Es stellt sich die Frage, ob wir vielleicht die falschen Methoden und Techniken zur frühzeitigen und akkuraten Erkennung eines Einbruchs oder des böswilligen Insiders verwenden?

Active Directory Solution – ADSecure Infographic

With the ADSecure solution organizations improve Active Directory security without touching the production AD environment.

How to Use Deception to Defeat Your Adversaries

During this webinar, Geoff Hancock, CEO at the Advanced Cybersecurity Group, and Tony Cole, CTO at Attivo Networks, will discuss how using deception can get you inside the attacker’s OODA loop, lead the adversary to make mistakes, and fortify your cybersecurity defenses.

Modern Deception Technology – Advanced Methods for Reducing Cyber Risk

Join host Carolyn Crandall, Chief Deception Officer at Attivo Networks, and special guest Edward Amoroso, CEO of TAG Cyber, to hear exclusive insights on how modern deception technology is being used for early and accurate threat detection, network visibility, and cyber risk reduction.

Webinar: Deception Imperatives and Vendor Comparison Spotlight

Industry veteran Jim Hurley, the CEO of Wellington Research and Cyber Source Data, will cover primary research results on cyber effectiveness and how it is influenced by detection and incident response. Additionally, attendees will gain insights into the latest Wellington Research Market Spotlight covering the vendors and market for deception.

eBook: Deception-Based Threat Detection – Shifting Power to the Defenders

This ebook provides a general introduction to deception technology and an overview of use cases from general detection to creating an active defense. You will gain a better understanding of how deception fits within your overall security architecture and the role it plays in detecting, identifying, and responding to threats.

ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™): A Definitive Market Guide to Deception Technology

This research from EMA  highlights how enterprises are using deception technology, the value they see in it, the challenges they have with it, and how they intend to use it in the future.

Understanding Deception Technology

This document explains the role deception has historically played in attack and defense as well as highlights why it has become a necessary part of a modern cybersecurity stack. Deception technology is becoming a core necessity in any security architecture. 

Attivo Networks® ThreatDefend™ Platform and the ISO/IEC 27000 Family of Standards

The International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) 27000 family of standards helps organizations keep information assets secure. 

Behind the Mask with Alan Commike and Carolyn Crandall at RSAC 2019

Accomplished cyber security technology leader, Alan Commike, and Chief Deception Officer, Carolyn Crandall, sit down to discuss the benefits of Deception Technology at RSA 2019

Carolyn Crandall and Lance Spitzner at RSAC 2019

Carolyn Crandall, Attivo Networks Chief Deception Officer, and Lance Spitzner, founder of the honeynet project, discuss the evolution of deception technology at RSAC 2019 in Broadcast Alley.

ThreatDefend® Platform Feature Highlight: ThreatDirect®

The Attivo Networks® ThreatDefend® platform includes the ThreatDirect® feature that provides organization with the ability to easily and efficiently project deception into remote locations and microsegmented networks, extending their coverage without needing to deploy additional BOTsink® deception servers. 

Deception Through the Eyes of a Forensic Researcher

Deception arms the defender with early detection, automated attack analysis, endpoint forensics, and substantiated alerts for accelerated incident response.

ThreatDefend® Feature Highlight: Vulnerability Simulation

Organizations can configure the Attivo Networks® BOTsink® appliance to simulate known vulnerabilities, giving highly accurate alerts if an attacker attempts to leverage one against the organization. This form of simulation responds to an attacker’s effort as if it was vulnerable without actually compromising the target host or allowing the attacker to expand their footprint.

ThreatDefend® Feature Highlight: Decoy Documents

Attivo’s Decoy Documents capability is available across the entire BOTsink range, including physical, virtual, and Cloud instances.

Cyber Deception: How To Build A Program

Geoff Hancock has been in cybersecurity for 27 years. He has worked in the military, intelligence community, civilian agencies and corporations, conducting cyber operations, Active Cyber Defense, Deception and Intelligence. He has been a CISO, CTO and VP and currently is the CEO of Advanced Cybersecurity Group, where he heads up a team of cyber deception and intelligence analysts providing instruction and program operations. Understand the value of having a cyber deception plan in place and learn the information you need to know to get one started in this white paper.

Attivo BOTsink® 3550 Data Sheet (Only Available in India)

The Attivo BOTsink 3550 appliance is scaled to support medium-sized deployments offering a full range of deception functionality and additional features. This appliance is only available in India.

Deception Myths: Clarifying Industry Misconceptions

The earliest deception systems were used primarily for research and they were difficult to set up and maintain. Those preliminary experiences have led to some myths and misconceptions about deception. This paper will address and debunk those myths, while detailing how deception has evolved into an invaluable asset for organization’s Defense in Depth postures.

Threat Deception for an Active Defense

Attivo Networks® deception-based threat detection shifts the power to the defender with a unique approach that reduces risk, accelerates incident response, and improves the overall effectiveness and efficiency of existing security controls. To learn more about deception-based threat detection, view this document.

ThreatDefend Platform Feature Highlight : Authentic Deception

At its core, deception technology relies on presenting an attacker with decoys and lures that are indistinguishable from real assets. Highly authentic decoys are vital for any organization looking to add deception technology for in-network threat detection. This feature highlight addresses the importance of authenticity in deception and the ways in which Attivo Networks has made authenticity a core feature of the ThreatDefend platform.

Assessing Deception Technology Solutions for a Proactive Defense

This paper takes a detailed look at what an ideal deception system should encompass, with an emphasis on how deception technologies can protect a production environment, including a checklist to help assess the options.

Attivo Networks® BOTsink® Family Data Sheet

The Attivo Networks BOTsink family offers a range of systems to meet the diverse needs of organizations, and are available as physical appliances, virtual appliances, or as a Cloud instance.

Deception Technology: Fad or Fashion for 2019

Deception technology adoption soared in 2017 and 2018. Was this simply a fad or is deception coming into fashion as the de facto in-network detection security control?

Major Energy Provider chooses Deception Technology to Better Protect Critical Assets

The Director of Cybersecurity for a large public energy utility organization had confidence in their perimeter security, but realized they needed better visibility into their internal network in the event of a compromise or when facing an insider threat. Read the full case study to learn more.

Attivo Networks Threat Deception to Comply with the Reserve Bank of India Cybersecurity Framework

This whitepaper explains how the Attivo Networks® ThreatDefendTM platform enables organizations to meet specific compliance issues specified in the RBI CS Framework, along with numerous other requirements. This paper further explains how the Attivo Networks solution provides comprehensive detection and response to organizations under threat.

How Threat Deception Fits Within Your Security Stack

Discussion about real-world threat detection deployment experiences and the reasons why organizations are choosing deception technology.

10 Security Projects CISOs Should Consider: Gartner Analyst

At last week’s Gartner Security Summit in National Harbor, Maryland, Gartner analyst Neil MacDonald outlined 10 cybersecurity projects that could go a long way toward reducing enterprise security risk.

Deception for a SWIFT Defense

The SWIFT network links more than 11,000 financial institutions in more than 200 countries and territories worldwide, and as such, requires a level of trust between member institutions to ensure the integrity of the network. Unfortunately, the SWIFT network has increasingly become a target of attackers over the past few years and traditional security measures are no longer sufficient to deter and stop attackers. This white paper delves into the ways deception technology addresses these challenges.

Attivo Networks® DecoyDocs Datasheet

The ThreatDefend Deception and Response Platform provides an inherently offensive counterintelligence function. The solution seeks to disrupt and degrade the information-gathering and attack operations an adversary conducts inside the network, while at the same time providing collective counterintelligence functions by helping develop threat and adversary intelligence.

Attivo Networks® ThreatStrike™ Solution: Endpoint Deception-based Detection

The Attivo ThreatStrike End-Point Deception Solution is a customizable and non-intrusive technology that is used to identify targeted attacks of infected end-points, infected servers/VMs, the use of deception stolen credentials, and ransomware attacks on networked drives. The solution also provides for suspicious email submission for threat detection.

Attivo Networks® ThreatPath™ Platform Overview

The Attivo ThreatPath™ solution provides an attack path vulnerability assessment based on likely attack paths that an attacker would traverse through misconfigured systems or credential misuse.

Attivo Networks® ThreatOps™ Platform

The ThreatOps™ Platform works hand-in-hand with the BOTsink engagement server for in-network threat detection, attack analysis, and acceleration of incident response.

GDPR with Deceptive Technology Perspective

GDPR is The General Data Protection Regulation which will radically change the data usage and protection landscape when the document comes into force on May 25th, 2018.

Deception Technology—Much more than a Honeypot

This solution brief will detail the origins of honeypots, the logic behind them, and what features ultimately inhibited their universal adoption – followed by a look into what comprises present-day deception technology, how it has evolved, and the functionalities that are catalyzing worldwide deployment and adoption.

Attivo Networks® ThreatDefend™ Deception and Response Platform Overview

A brief introduction to deception technology and the Attivo Networks ThreatDefend Deception and Response Platform.

ThreatOps™ Incident Handling and Response

There are many challenges faced by IR and SecOps that technology innovations can now address. The Attivo Networks ThreatDefend Platform accurately and efficiently addresses these challenges while extending the value of existing security infrastructure 

BOTsink® Analysis Functions

To help security analysts investigate incidents, gather forensic evidence, and analyze malware, the BOTsink provides the Attack Threat Analysis (ATA) engine and the Malware Analysis Sandbox (MAS).

BOTsink™ Decoys and Engagement Servers

The BOTsink™ solution provides the foundation for the ThreatDefend™ platform, turning the entire network into a trap with a matrix of distributed decoy systems.

Discussion on Deception Webinar

Learn why deception is recognized as a top 2017 security technology to consider for detecting in-network threats.

ThreatPath™ Attack Path Vulnerability Assessment

The ThreatPath solution provides continuous attack path vulnerability assessment.

Introduction to Deception Technology

A brief introduction to deception technology and the Attivo Networks ThreatDefend Deception and Response Platform.

Deception as a Security Discipline for Advanced Threat Detection and Defense

Will the addition of deception deliver a bona fide return? We believe that deception delivers an effective and efficient defense and will share our rationale in this webinar.

What’s Lurking Deep in Your Network

Advanced techniques for finding malware lurking in corporate domains, remote offices, data centers, and in the cloud.

Know What is Lurking in Your Network

Find out how deception technology allows for in-network detection of advanced threats.

The Role of Dynamic Deception in the Cyber Kill Chain

Learn about the challenges of today’s threat landscape and the opportunities to address holes in the cyber attack lifecycle.

2019 TAG Cyber Security Handbook and Reference Guide

Attivo Networks is a distinguished vendor in the annual 2019 TAG Cyber Security Annual – Outlook for Fifty Cyber Security Controls. The Annual is a practical handbook and reference guide, designed for the working cybersecurity professional, created from expert advisory research based on discussions, interviews, website material, and other information.


At-a-Glance

Attivo Networks for Enterprise Identity Protection and Lateral Movement Detection

Choosing an Active Directory Visibility Solution

The Attivo ThreatStrike® component of the Endpoint Detection Net (EDN) suite provides customizable and nonintrusive credential protection and early detection of targeted attacks on endpoints and servers.

eWeek: How ADAssessor Brings Visibility to AD Attack Surfaces

Evaluation and commentary by Frank J. Ohlhorst, award-winning technology journalist and IT industry analyst.

Attivo Networks Fact Sheet

Attivo Networks®, the leader in deception for cybersecurity defense, provides a comprehensive deception-based platform designed for early and accurate detection of external or internal threats using any lateral movement attack method…

Portfolio Overview

Comprehensive detection for empowering the defender and eliminating the attacker’s advantage.

Attivo Networks ThreatDefend® Platform Overview

Learn about what the ThreatDefend Platform can offer in this short 65 second video overview.

Disrupt an Attacker’s Ability to Discover Networks and Move Laterally with Deflect

This white paper discusses key use cases of the Endpoint Detection Net’s Deflect function that prevent attackers from fingerprinting an endpoint to identify security weaknesses and conducting reconnaissance.

ADAssessor for Continuous Visibility to Active Directory Exposures & Live Attacks

The ADAssessor solution is a standalone offering that provides continuous visibility to AD exposures vulnerable to attack and detects advanced Active Directory attacks in real-time.

InSecurity: Using Deception to Safeguard the Trut‪h‬

Matt Stephenson welcomes Attivo Networks CTO Tony Cole to InSecurity for chat about the role deception techniques play in security. But that’s not all… we get into how the privatization of space will impact cybersecurity… where cybersecurity fits into Black Swan events like the Wall Street Bets brouhaha… even a bit of Pink Floyd works into the mix!

Active Directory Protection Animated Video

Active Directory, which is used to authenticate and authorize services, is notoriously difficult to protect. Virtually every employee needs some level of access to its data and, all too frequently, it is either misconfigured or overprovisioned, making it a prime attacker target.

BOTsink® Deception and Decoy Technology for Threat Detection

The Attivo Networks BOTsink® solution stands guard inside your network, using high-interaction deception and decoy technology to lure attackers into engaging and revealing themselves. Through misdirection of the attack, organizations gain the advantage of time to detect, analyze, and stop an attacker.

SC Media ThreatDefend Platform v5.0 Review

Security pros will find the Attivo ThreatDefend Platform a comprehensive detection product that uses machine learning to customize decoys based on the systems, applications, and environments into which it has been deployed and adds endpoint components to hide data and deflect port and service scans to decoys…

Attivo Networks ThreatPath Cyber Hygiene & Attack Surface Reduction

The Attivo ThreatPath® solution, part of the modular ThreatDefend Endpoint Detection Net family of products, provides continuous attack surface monitoring, reduces attack paths, and improves organizations’ cyber hygiene.

Deflect Attacks with the Endpoint Detection Net Suite

The EDN Deflect function brings a needed capability to make every endpoint a part of the deception fabric. By denying attackers the ability to collect accurate information on their targets and disrupt their ability to move laterally undetected, the Deflect function gives organizations an early warning and an active defense against malicious East/ West traffic to increase their security posture and catch attackers early in the attack cycle.

Scaling Detection with the ThreatDirect Solution

It is critical to have visibility across the entire network with no gaps based on location or resource limitations. With the ThreatDirect solution, organizations can now scale their adaptive defense across remote areas of their network with full-featured deception-based detection, automated attack analysis, and accelerated incident response capabilities.

9 Notable 2020 CISO Challenges – Are they the Same as Yours?

The world has changed in so many ways in 2020. Even with the best-laid plans and precautions, CISOs have had to quickly respond to the COVID-19 pandemic, revising strategies and transitioning from unprepared to prepared. Read on for a list of important things CISOs are tackling as they look to stay one step ahead in these rapidly changing times.

Behind the Scenes with Attivo Networks

Go behind the scenes with CEO, Tushar Kothari, CTO, Tony Cole, and CMO & Chief Deception Officer, Carolyn Crandall as they discuss the state of cybersecurity, the value of deception-based threat detection, and more.

Customer Experiences in Real-World Deception Deployments

In this webinar, you will have the unique opportunity to hear from three behind-the-mask security practitioners who are actively using Attivo Networks deception technology in very different environments.

Detecting the Deceivers through Deception

In this session we discuss deception tactics that defenders can use on adversaries to gain fast and high-fidelity detection across an enterprise. Hear why this defensive fight is relevant to companies large and small, regardless of security capability maturity.

How Deception is Shaping our Future

How are we using deception, and where could we be more effective, including a look towards the future of this technology and where/how to apply it.

 

Deception Technology in 2020 – ISMG Interview

Deception technology has moved from being an emerging technology to a more mainstream security control, say Tony Cole, CTO, and Carolyn Crandall, chief deception officer and chief marketing officer, at Attivo Networks.

RSA 2020 – Endpoint Detection Net

Recording from Broadcast Ally at RSA 2020, Carolyn Crandall and Tony Cole sit down to discuss Attivo Networks’ newest product announcement: Endpoint Detection Net, which tackles endpoint security challenges head-on by making every endpoint a decoy designed to disrupt an attacker’s ability to break out and further infiltrate the network.

RSA 2020 – Attivo Networks Deception-Based Threat Detection

Recording from Broadcast Ally at RSA 2020, Carolyn Crandall and Tony Cole sit down to discuss Attivo Networks deception technology and all that it offers.

Deception Technology: Active Defense to Combat Advanced Threats

Attivo Networks deception technology provides the most authentic and comprehensive solution for detecting threats early in the attack lifecycle. Organizations shifting to an offensive posture will simplify detection operations and gain the critical tools they need to improve their security posture in the war against cyber attackers.

German Webinar: Deception, die bessere Methode Widersacher zu erkennen!

Trotz steigender Ausgaben für Cybersecurity nehmen Anzahl und Ausmaß von Breaches zu. Darüber hinaus bleibt die Zeitspanne bis zur Entdeckung eines Einbruchs immer noch sehr hoch mit fast 78 Tagen im globalen Durchschnitt. Es stellt sich die Frage, ob wir vielleicht die falschen Methoden und Techniken zur frühzeitigen und akkuraten Erkennung eines Einbruchs oder des böswilligen Insiders verwenden?

Active Directory Solution – ADSecure Infographic

With the ADSecure solution organizations improve Active Directory security without touching the production AD environment.

How to Use Deception to Defeat Your Adversaries

During this webinar, Geoff Hancock, CEO at the Advanced Cybersecurity Group, and Tony Cole, CTO at Attivo Networks, will discuss how using deception can get you inside the attacker’s OODA loop, lead the adversary to make mistakes, and fortify your cybersecurity defenses.

Modern Deception Technology – Advanced Methods for Reducing Cyber Risk

Join host Carolyn Crandall, Chief Deception Officer at Attivo Networks, and special guest Edward Amoroso, CEO of TAG Cyber, to hear exclusive insights on how modern deception technology is being used for early and accurate threat detection, network visibility, and cyber risk reduction.

Webinar: Deception Imperatives and Vendor Comparison Spotlight

Industry veteran Jim Hurley, the CEO of Wellington Research and Cyber Source Data, will cover primary research results on cyber effectiveness and how it is influenced by detection and incident response. Additionally, attendees will gain insights into the latest Wellington Research Market Spotlight covering the vendors and market for deception.

eBook: Deception-Based Threat Detection – Shifting Power to the Defenders

This ebook provides a general introduction to deception technology and an overview of use cases from general detection to creating an active defense. You will gain a better understanding of how deception fits within your overall security architecture and the role it plays in detecting, identifying, and responding to threats.

ENTERPRISE MANAGEMENT ASSOCIATES® (EMA™): A Definitive Market Guide to Deception Technology

This research from EMA  highlights how enterprises are using deception technology, the value they see in it, the challenges they have with it, and how they intend to use it in the future.

Understanding Deception Technology

This document explains the role deception has historically played in attack and defense as well as highlights why it has become a necessary part of a modern cybersecurity stack. Deception technology is becoming a core necessity in any security architecture. 

Attivo Networks® ThreatDefend™ Platform and the ISO/IEC 27000 Family of Standards

The International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) 27000 family of standards helps organizations keep information assets secure. 

Behind the Mask with Alan Commike and Carolyn Crandall at RSAC 2019

Accomplished cyber security technology leader, Alan Commike, and Chief Deception Officer, Carolyn Crandall, sit down to discuss the benefits of Deception Technology at RSA 2019

Carolyn Crandall and Lance Spitzner at RSAC 2019

Carolyn Crandall, Attivo Networks Chief Deception Officer, and Lance Spitzner, founder of the honeynet project, discuss the evolution of deception technology at RSAC 2019 in Broadcast Alley.

ThreatDefend® Platform Feature Highlight: ThreatDirect®

The Attivo Networks® ThreatDefend® platform includes the ThreatDirect® feature that provides organization with the ability to easily and efficiently project deception into remote locations and microsegmented networks, extending their coverage without needing to deploy additional BOTsink® deception servers. 

Deception Through the Eyes of a Forensic Researcher

Deception arms the defender with early detection, automated attack analysis, endpoint forensics, and substantiated alerts for accelerated incident response.

ThreatDefend® Feature Highlight: Vulnerability Simulation

Organizations can configure the Attivo Networks® BOTsink® appliance to simulate known vulnerabilities, giving highly accurate alerts if an attacker attempts to leverage one against the organization. This form of simulation responds to an attacker’s effort as if it was vulnerable without actually compromising the target host or allowing the attacker to expand their footprint.

ThreatDefend® Feature Highlight: Decoy Documents

Attivo’s Decoy Documents capability is available across the entire BOTsink range, including physical, virtual, and Cloud instances.

Cyber Deception: How To Build A Program

Geoff Hancock has been in cybersecurity for 27 years. He has worked in the military, intelligence community, civilian agencies and corporations, conducting cyber operations, Active Cyber Defense, Deception and Intelligence. He has been a CISO, CTO and VP and currently is the CEO of Advanced Cybersecurity Group, where he heads up a team of cyber deception and intelligence analysts providing instruction and program operations. Understand the value of having a cyber deception plan in place and learn the information you need to know to get one started in this white paper.

Attivo BOTsink® 3550 Data Sheet (Only Available in India)

The Attivo BOTsink 3550 appliance is scaled to support medium-sized deployments offering a full range of deception functionality and additional features. This appliance is only available in India.

Deception Myths: Clarifying Industry Misconceptions

The earliest deception systems were used primarily for research and they were difficult to set up and maintain. Those preliminary experiences have led to some myths and misconceptions about deception. This paper will address and debunk those myths, while detailing how deception has evolved into an invaluable asset for organization’s Defense in Depth postures.

Threat Deception for an Active Defense

Attivo Networks® deception-based threat detection shifts the power to the defender with a unique approach that reduces risk, accelerates incident response, and improves the overall effectiveness and efficiency of existing security controls. To learn more about deception-based threat detection, view this document.

ThreatDefend Platform Feature Highlight : Authentic Deception

At its core, deception technology relies on presenting an attacker with decoys and lures that are indistinguishable from real assets. Highly authentic decoys are vital for any organization looking to add deception technology for in-network threat detection. This feature highlight addresses the importance of authenticity in deception and the ways in which Attivo Networks has made authenticity a core feature of the ThreatDefend platform.

Assessing Deception Technology Solutions for a Proactive Defense

This paper takes a detailed look at what an ideal deception system should encompass, with an emphasis on how deception technologies can protect a production environment, including a checklist to help assess the options.

Attivo Networks® BOTsink® Family Data Sheet

The Attivo Networks BOTsink family offers a range of systems to meet the diverse needs of organizations, and are available as physical appliances, virtual appliances, or as a Cloud instance.

Deception Technology: Fad or Fashion for 2019

Deception technology adoption soared in 2017 and 2018. Was this simply a fad or is deception coming into fashion as the de facto in-network detection security control?

Major Energy Provider chooses Deception Technology to Better Protect Critical Assets

The Director of Cybersecurity for a large public energy utility organization had confidence in their perimeter security, but realized they needed better visibility into their internal network in the event of a compromise or when facing an insider threat. Read the full case study to learn more.

Attivo Networks Threat Deception to Comply with the Reserve Bank of India Cybersecurity Framework

This whitepaper explains how the Attivo Networks® ThreatDefendTM platform enables organizations to meet specific compliance issues specified in the RBI CS Framework, along with numerous other requirements. This paper further explains how the Attivo Networks solution provides comprehensive detection and response to organizations under threat.

How Threat Deception Fits Within Your Security Stack

Discussion about real-world threat detection deployment experiences and the reasons why organizations are choosing deception technology.

10 Security Projects CISOs Should Consider: Gartner Analyst

At last week’s Gartner Security Summit in National Harbor, Maryland, Gartner analyst Neil MacDonald outlined 10 cybersecurity projects that could go a long way toward reducing enterprise security risk.

Deception for a SWIFT Defense

The SWIFT network links more than 11,000 financial institutions in more than 200 countries and territories worldwide, and as such, requires a level of trust between member institutions to ensure the integrity of the network. Unfortunately, the SWIFT network has increasingly become a target of attackers over the past few years and traditional security measures are no longer sufficient to deter and stop attackers. This white paper delves into the ways deception technology addresses these challenges.

Attivo Networks® DecoyDocs Datasheet

The ThreatDefend Deception and Response Platform provides an inherently offensive counterintelligence function. The solution seeks to disrupt and degrade the information-gathering and attack operations an adversary conducts inside the network, while at the same time providing collective counterintelligence functions by helping develop threat and adversary intelligence.

Attivo Networks® ThreatStrike™ Solution: Endpoint Deception-based Detection

The Attivo ThreatStrike End-Point Deception Solution is a customizable and non-intrusive technology that is used to identify targeted attacks of infected end-points, infected servers/VMs, the use of deception stolen credentials, and ransomware attacks on networked drives. The solution also provides for suspicious email submission for threat detection.

Attivo Networks® ThreatPath™ Platform Overview

The Attivo ThreatPath™ solution provides an attack path vulnerability assessment based on likely attack paths that an attacker would traverse through misconfigured systems or credential misuse.

Attivo Networks® ThreatOps™ Platform

The ThreatOps™ Platform works hand-in-hand with the BOTsink engagement server for in-network threat detection, attack analysis, and acceleration of incident response.

GDPR with Deceptive Technology Perspective

GDPR is The General Data Protection Regulation which will radically change the data usage and protection landscape when the document comes into force on May 25th, 2018.

Deception Technology—Much more than a Honeypot

This solution brief will detail the origins of honeypots, the logic behind them, and what features ultimately inhibited their universal adoption – followed by a look into what comprises present-day deception technology, how it has evolved, and the functionalities that are catalyzing worldwide deployment and adoption.

Attivo Networks® ThreatDefend™ Deception and Response Platform Overview

A brief introduction to deception technology and the Attivo Networks ThreatDefend Deception and Response Platform.

ThreatOps™ Incident Handling and Response

There are many challenges faced by IR and SecOps that technology innovations can now address. The Attivo Networks ThreatDefend Platform accurately and efficiently addresses these challenges while extending the value of existing security infrastructure 

BOTsink® Analysis Functions

To help security analysts investigate incidents, gather forensic evidence, and analyze malware, the BOTsink provides the Attack Threat Analysis (ATA) engine and the Malware Analysis Sandbox (MAS).

BOTsink™ Decoys and Engagement Servers

The BOTsink™ solution provides the foundation for the ThreatDefend™ platform, turning the entire network into a trap with a matrix of distributed decoy systems.

Discussion on Deception Webinar

Learn why deception is recognized as a top 2017 security technology to consider for detecting in-network threats.

ThreatPath™ Attack Path Vulnerability Assessment

The ThreatPath solution provides continuous attack path vulnerability assessment.

Introduction to Deception Technology

A brief introduction to deception technology and the Attivo Networks ThreatDefend Deception and Response Platform.

Deception as a Security Discipline for Advanced Threat Detection and Defense

Will the addition of deception deliver a bona fide return? We believe that deception delivers an effective and efficient defense and will share our rationale in this webinar.

What’s Lurking Deep in Your Network

Advanced techniques for finding malware lurking in corporate domains, remote offices, data centers, and in the cloud.

Know What is Lurking in Your Network

Find out how deception technology allows for in-network detection of advanced threats.

The Role of Dynamic Deception in the Cyber Kill Chain

Learn about the challenges of today’s threat landscape and the opportunities to address holes in the cyber attack lifecycle.

2019 TAG Cyber Security Handbook and Reference Guide

Attivo Networks is a distinguished vendor in the annual 2019 TAG Cyber Security Annual – Outlook for Fifty Cyber Security Controls. The Annual is a practical handbook and reference guide, designed for the working cybersecurity professional, created from expert advisory research based on discussions, interviews, website material, and other information.