• Categories

  • Format

Deception Technology Use Cases to Defeat Advanced Attackers

Check out this use case document to find out how to strategically use deception technology to defeat even the most advanced threat actors.

Endpoint Detection Net Suite Use Case

It is critical for organizations to protect their endpoints and prevent attackers from spreading throughout the network. Most will use various forms of EPP and EDR solutions to defend endpoints from attacks. The Attivo Networks® Endpoint Detection Net (EDN) suite provides capabilities that complement these existing endpoint security solutions.

Manufacturer Protects Intellectual Property with the Attivo Deception Platform

Semiconductor company uses deception to add visibility into subnets that house their most critical data

Major Sports Organization Protects Critical Infrastructure With Deception Technology

Major sports organization detects and diverts attack during a live event

Large Retailer uses Deception for Active Acquisition Strategy

Large retailer uses deception technology to maintain network integrity in an active acquisition strategy.

Deception Technology Derails Ransomware Attack on Regional Healthcare Provider

Regional healthcare organization successfully stops the spread of a ransomware attack in their network

Major Entertainment Organization Deploys Deception for Insider Threat Visibility

Major entertainment company protects intellectual property from insider and stolen credential attacks

Financial Institution Thwarts Penetration Test with Deception

Financial institution uses deception to pass penetration test they failed with other security devices.

Financial Services Firm Deploys ADSecure During Red Team Evaluation

 A commercial bank with over $100 billion in total assets. 

Real Estate Investment Firm Tests ADSecure

 A major US-based real estate investment company with over 200 properties. 

Deception for Derailing Ransomware and Related Malware Attacks

 The Attivo Networks® ThreatDefend platform combats ransomware, and related malware, using a combination of the BOTsink® server hosting decoy systems, including network file shares, and the ThreatStrike® solution that places deceptive assets on the endpoints, including deceptive credentials and fake file shares. 

World-Renowned Vehicle Manufacturer Selects Attivo Networks to Protect its Research and Development Organization

Producing everything from jet aircraft to automobiles and motorcycles, this industry-leading manufacturer had recently created a fully dedicated cybersecurity team to protect their Intellectual Property “Crown Jewels.” Previously, information security was a distributed responsibility across their IT and Infrastructure teams. 

UK Financial Services Company Chooses Attivo Networks to Enhance its Security Stack with Deception Technology

Operating in the financial services sector, the organization must comply with a range of specific regulations, which made data security a top priority. The organization considered early and accurate detection highly important and had additional concerns with identifying lateral movement. 

Private Sector Bank in India Chooses Attivo Networks to add Deception Technology for Enhanced Cybersecurity

Situation: As a large private sector bank in India, this organization is subject to the extensive regulations regarding cybersecurity, privacy, etc. The bank was familiar with deception technology, having deployed a competing solution over two years ago. 

Financial Services Company in India Chooses Attivo Networks to Expand Use of Deception Technology for Cybersecurity

 Situation: The organization was familiar with basic deception technology from their experience with a competitor’s product. However, they found that their existing solution only provided limited protection and they wanted a more comprehensive suite of deception functionality. 

Case Study: Law Firm Chooses Attivo Networks Deception Technology as a Managed Service

The Attivo Networks ThreatDefend platform gave the firm the tools and visibility they needed to address their primary concerns of detecting lateral movement, thwarting insider threats, and providing an effective means to disrupt the spread of ransomware and related malware.

Case Study: Leading Multi-Country Bank Chooses Attivo Networks Deception Technology

 The Attivo Networks® ThreatDefend platform delivered a high-powered solution to defend their assets across an environment spread through several countries. 

Real Estate Investment Trust Chooses Attivo Networks to Provide In-Network Threat Detection

The CISO was familiar with deception technology and what it could do for their environment but was convinced that free and open source (FOSS) offerings and FOSS based commercial solutions could satisfy their needs. After a product demonstration, the CISO’s opinion was swayed and opted into deception.

Financial Services Software Company Selects Attivo’s ThreatDefend Platform to Protect Cloud Assets at Scale

 The software development company had experience with deception technology from their previous deployment of a competitor’s solution. The ThreatDefend platform won the competitive bake-off by demonstrating superior performance, easy deployment, comprehensive protection, and scalability for the company’s cloud-centric environment.

MSSP Works with Large Metropolitan Public School District to use Deception for Network Visibility

State University System Chooses Deception for Enhanced Detection and Incident Response

Major Financial Services Company Case Study

The Vice President of Cybersecurity required better visibility into their large and diverse international network that spanned corporate and remote offices.

Regional Bank Case Study

Penetration testing conducted by a 3rd party red team revealed security gaps in several areas of detection and visibility. The financial institution wanted to improve their detection and response capabilities.

M&A Customer Case Study

This white paper will delve into some of the information security challenges organizations are likely to face during the M&A process, and how using deception technology to identify potential issues and will make the infrastructure integration process smoother and more secure.

Major Energy Provider chooses Deception Technology to Better Protect Critical Assets

The Director of Cybersecurity for a large public energy utility organization had confidence in their perimeter security, but realized they needed better visibility into their internal network in the event of a compromise or when facing an insider threat. Read the full case study to learn more.

Healthcare IoT Device Case Study

HEALTHCARE CUSTOMERS DETECTS INFECTED IOT DEVICES

The Attivo Solution detected malware spreading from IoT medical device that bypassed all existing security controls.

Attivo Networks Deception Platform for Forensics and Incident Response

Regional healthcare organization inoculates their network against aggressive Qakbot malware

Semiconductor Company Implements Deception to Stop Man-in-the-Middle Attacks

Semiconductor manufacturer adopts deception for real-time Man-in-the-Middle detection

Aflac, Inc. Uses Deception for Zero-False-Positives Threat Detection

Aflac, Inc. uses deception to stay one step ahead of cyber attackers


Deception Technology Use Cases to Defeat Advanced Attackers

Check out this use case document to find out how to strategically use deception technology to defeat even the most advanced threat actors.

Endpoint Detection Net Suite Use Case

It is critical for organizations to protect their endpoints and prevent attackers from spreading throughout the network. Most will use various forms of EPP and EDR solutions to defend endpoints from attacks. The Attivo Networks® Endpoint Detection Net (EDN) suite provides capabilities that complement these existing endpoint security solutions.

Manufacturer Protects Intellectual Property with the Attivo Deception Platform

Semiconductor company uses deception to add visibility into subnets that house their most critical data

Major Sports Organization Protects Critical Infrastructure With Deception Technology

Major sports organization detects and diverts attack during a live event

Large Retailer uses Deception for Active Acquisition Strategy

Large retailer uses deception technology to maintain network integrity in an active acquisition strategy.

Deception Technology Derails Ransomware Attack on Regional Healthcare Provider

Regional healthcare organization successfully stops the spread of a ransomware attack in their network

Major Entertainment Organization Deploys Deception for Insider Threat Visibility

Major entertainment company protects intellectual property from insider and stolen credential attacks

Financial Institution Thwarts Penetration Test with Deception

Financial institution uses deception to pass penetration test they failed with other security devices.

Financial Services Firm Deploys ADSecure During Red Team Evaluation

 A commercial bank with over $100 billion in total assets. 

Real Estate Investment Firm Tests ADSecure

 A major US-based real estate investment company with over 200 properties. 

Deception for Derailing Ransomware and Related Malware Attacks

 The Attivo Networks® ThreatDefend platform combats ransomware, and related malware, using a combination of the BOTsink® server hosting decoy systems, including network file shares, and the ThreatStrike® solution that places deceptive assets on the endpoints, including deceptive credentials and fake file shares. 

World-Renowned Vehicle Manufacturer Selects Attivo Networks to Protect its Research and Development Organization

Producing everything from jet aircraft to automobiles and motorcycles, this industry-leading manufacturer had recently created a fully dedicated cybersecurity team to protect their Intellectual Property “Crown Jewels.” Previously, information security was a distributed responsibility across their IT and Infrastructure teams. 

UK Financial Services Company Chooses Attivo Networks to Enhance its Security Stack with Deception Technology

Operating in the financial services sector, the organization must comply with a range of specific regulations, which made data security a top priority. The organization considered early and accurate detection highly important and had additional concerns with identifying lateral movement. 

Private Sector Bank in India Chooses Attivo Networks to add Deception Technology for Enhanced Cybersecurity

Situation: As a large private sector bank in India, this organization is subject to the extensive regulations regarding cybersecurity, privacy, etc. The bank was familiar with deception technology, having deployed a competing solution over two years ago. 

Financial Services Company in India Chooses Attivo Networks to Expand Use of Deception Technology for Cybersecurity

 Situation: The organization was familiar with basic deception technology from their experience with a competitor’s product. However, they found that their existing solution only provided limited protection and they wanted a more comprehensive suite of deception functionality. 

Case Study: Law Firm Chooses Attivo Networks Deception Technology as a Managed Service

The Attivo Networks ThreatDefend platform gave the firm the tools and visibility they needed to address their primary concerns of detecting lateral movement, thwarting insider threats, and providing an effective means to disrupt the spread of ransomware and related malware.

Case Study: Leading Multi-Country Bank Chooses Attivo Networks Deception Technology

 The Attivo Networks® ThreatDefend platform delivered a high-powered solution to defend their assets across an environment spread through several countries. 

Real Estate Investment Trust Chooses Attivo Networks to Provide In-Network Threat Detection

The CISO was familiar with deception technology and what it could do for their environment but was convinced that free and open source (FOSS) offerings and FOSS based commercial solutions could satisfy their needs. After a product demonstration, the CISO’s opinion was swayed and opted into deception.

Financial Services Software Company Selects Attivo’s ThreatDefend Platform to Protect Cloud Assets at Scale

 The software development company had experience with deception technology from their previous deployment of a competitor’s solution. The ThreatDefend platform won the competitive bake-off by demonstrating superior performance, easy deployment, comprehensive protection, and scalability for the company’s cloud-centric environment.

MSSP Works with Large Metropolitan Public School District to use Deception for Network Visibility

State University System Chooses Deception for Enhanced Detection and Incident Response

Major Financial Services Company Case Study

The Vice President of Cybersecurity required better visibility into their large and diverse international network that spanned corporate and remote offices.

Regional Bank Case Study

Penetration testing conducted by a 3rd party red team revealed security gaps in several areas of detection and visibility. The financial institution wanted to improve their detection and response capabilities.

M&A Customer Case Study

This white paper will delve into some of the information security challenges organizations are likely to face during the M&A process, and how using deception technology to identify potential issues and will make the infrastructure integration process smoother and more secure.

Major Energy Provider chooses Deception Technology to Better Protect Critical Assets

The Director of Cybersecurity for a large public energy utility organization had confidence in their perimeter security, but realized they needed better visibility into their internal network in the event of a compromise or when facing an insider threat. Read the full case study to learn more.

Healthcare IoT Device Case Study

HEALTHCARE CUSTOMERS DETECTS INFECTED IOT DEVICES

The Attivo Solution detected malware spreading from IoT medical device that bypassed all existing security controls.

Attivo Networks Deception Platform for Forensics and Incident Response

Regional healthcare organization inoculates their network against aggressive Qakbot malware

Semiconductor Company Implements Deception to Stop Man-in-the-Middle Attacks

Semiconductor manufacturer adopts deception for real-time Man-in-the-Middle detection

Aflac, Inc. Uses Deception for Zero-False-Positives Threat Detection

Aflac, Inc. uses deception to stay one step ahead of cyber attackers