Cybersecurity attacks are increasing in volume and effectiveness against military organizations, federal, state and local governments. Traditional network defenses have focused on preventing intrusions, however with the need for broad services and ease of access to information, it is no longer possible to reliably secure what is now viewed as a perimeter-less border.
Threat deception technology provides government entities the foundation for an active defense that provides early and accurate detection of in-network threats and the ability to respond to them quickly and decisively. This is done through a mix of decoys, endpoint lures, application and data deceptions all designed to identify and misdirect an adversary.
Scalable for all environments, the Attivo ThreatDefend platform easily meets the needs of all agencies with broad threat detection coverage for networks, data centers, cloud, and specialized devices such as SCADA, IoT, infrastructure, and telecommunications. The solution is also not reliant on known attack information, which makes for accurate and effective detection against advanced targeted attacks.
The 3rd largest threat to government agencies with 71% having experienced a breach.
60% of surveyed companies using ICS or SCADA reported experiencing a breach in 2017-2018.
191 million records compromised at independent government civilian workforce agency.
Comply with regulatory mandates, directives and policy standards.
Early detection of in-network human and automated attackers seeking to establish establish “backdoors” and breach networks.
Accurate detection of threats targeting business networks, operational infrastructures, industrial control systems and secure cities.
Accurate visibility to in-network threats, exposed attack paths, sequencing, and replay.
Machine-learning automates deployment and operations. Actionable alerts, automation, and native integrations empower fast response to alerts.
Native integrations with current SOC tools and existing security architecture to simplify incident response.
The stakes are high for all forms of government – federal, state, local, and educational institutions are all not immune. Foreign intelligence services have a goldmine of information about federal employees at every level of the government that could be leveraged for additional highly-targeted cyber attacks and other espionage. Governments are an attractive target for cybercriminals that look to capitalize off of the sale of government personnel and financial data or to cause harm to critical infrastructure or human safety.
The ThreatDefend platform addresses the unique and diverse needs of government as a highly targeted industry. The solution deploys authentic decoys throughout the environment indistinguishable from your real assets that are designed to lure attackers in and remediate them from the network.
As a highly targeted industry, governments are faced with sophisticated attacks that are renowned for bypassing perimeter defenses. Agencies are targeted by both external and internal threat actors and a new approach to security is needed to gain visibility and detection of these adversaries.
Detection methods for early reconnaissance and early credential harvesting, not reliant upon known signatures of attacks. Deception uses engagement vs. database look up to identify threats making the technology key in catching human and automated attackers as they use new variants or zero-day attacks to penetrate an organization.
Industrial controls systems (ICS-SCADA )are increasing being targeted by cyber terrorists, with the associated risks often viewed as a greater than that of physical threats. These systems often run on default credentials, older unpatchable operating systems or remain unpatched for security bugs and other issues if the patch could disturb existing system configurations or require any downtime or operating disruption. These risks are not limited to power and energy environments and are also present within smart city and building infrastructure.
The ThreatDefend platform provides early detection of attacks targeting ICS-SCADA devices and policy violations through the use of deceptions and decoys that appear indistinguishable to production assets. Effective for both upstream and downstream application, the ThreatDefend platform provides the needed visibility to in-network threats, attack analysis, and forensic reporting required to promptly derail attacks on critical infrastructure.
Malware, ransomware, and crypto mining attacks continue to exploit human mistakes and system vulnerabilities to find inroads into agencies of all sizes networks. Governments are primary targets due to the vast amount of data they hold and often complex operating environments that allow attackers to exploit systems for various forms of monetary gain or harm to environments.
The Attivo ThreatDefend platform is designed to derail these attacks by planting decoys and shared drives that appear as targets to the attacker. High interaction deception techniques will then engage and occupy the attacker, providing security teams the time needed to quarantine the infected system. Early detection and isolation better equip security teams to contain these attacks and stop an adversary before the attack can spread and cause additional damage.
Employees, contractors, and suppliers all create increased security risks and can pose significant harm to agencies as adversaries look to steal personal and sensitive information or inflict harm. Wikileaks and Snowden are both prime examples on how the U.S. federal government security has been compromised.
Agencies must also comply with Executive Order 13578, which directs structural reforms to ensure responsible sharing and safeguarding of classified information on computer networks that shall be consistent with appropriate protections for privacy and civil liberties. Agencies bear the primary responsibility for meeting these twin goals. The policy goes on to say that agencies should establish an “Insider Threat Task Force” that aims to “deterring, detecting, and mitigating insider threats, including the safeguarding of classified information from exploitation, compromise, or other unauthorized disclosure, taking into account risk levels, as well as the distinct needs, missions, and systems of individual agencies.
The Attivo solution provides early and accurate visibility and detection for insiders, contractors, suppliers, and trusted 3rd party organizations that are attempting to compromise networks or are in violation of security policies. Deception blends in with the production environment and detects all forms of adversary by deploying mirror match (to production assets) decoys that detect reconnaissance and lateral movement, misdirect credential harvesting and privileged account escalation and reveal exposed credentials and misconfigurations that create adversary attack paths.
Attivo Networks is proud to be a Small Business Member of AFCEA, a member-based organization providing a forum for military and government communities to connect with security and technology professionals from industry. www.afcea.org
The Federal Information Processing Standard (FIPS) Publication 140-2 is a Government security standard issued by the National Institute of Standards and Technology (NIST) and is used to approve cryptographic modules in cyber security products for use in Federal Government environments.
Attivo products are certified for FIPS 140-2 at Level 1 and Level 2.
Common Criteria is an internationally recognized standard which defines a framework for evaluating the security of IT products. US Government organizations, international Government entities, and many global Fortune 500 corporations require Common Criteria certification to aid in the evaluation of IT security products for use in their infrastructures.
Attivo products are certified under Common Criteria at EAL 2+.
Department of Defense Information Network Approved Products List (DoDIN APL) was created by the The Department of Defense to identify solutions that are trusted to address Government security concerns. The DoDIN APL is the agency’s master list of products available for purchase that are approved for deployment within the DoD’s technology infrastructure. Only those products listed will be considered for procurement by DoD contracting departments.
Attivo products are currently in Phase II of testing for the DoDIN APL.