Attivo Networks Blogs

Attivo Networks Tag

2017 Security 100: 25 Coolest Network Security Vendors

Reading Time: < 1 minute  |  Published: April 19, 2017 in Attivo News, Awards, Company Awards
0 Comments

Coolest Network Security Vendors Network security offerings provide the foundation for many companies’ security portfolios. However, the space has demanded change, as network perimeters disappear and threats continue to penetrate at an ever-increasing pace. To meet that, there has been an emergence of new offerings in...

Lights, Cameras, Hack(tion)

Reading Time: 2 minutes  |  Published: March 15, 2017 in Blogs
0 Comments

It had all the makings of a blockbuster horror movie: Malicious actors, ineffective agents and plenty of cameras. However, in last week’s hack through thousands of IoT devices, the carnage was real. The irony here is that the surveillance cameras companies use to monitor events...

Attivo Networks and Fortinet Integration Delivers Continuous Threat Management with Real-Time Detection and Automated Blocking

Reading Time: 3 minutes  |  Published: March 13, 2017 in Press Release
0 Comments

FREMONT, Calif., March 13, 2017 - Attivo Networks® announced today an integration combining the Attivo Networks ThreatMatrix Deception and Response Platform with the Fortinet FortiGate Firewall Platform. This integration leverages the Fortinet Security Fabric Application Programming Interfaces (APIs) to provide a comprehensive solution for continuous...

Attivo Networks ThreatDefend Platform Has Achieved Common Criteria EAL2+ Certification

Reading Time: 2 minutes  |  Published: March 8, 2017 in Awards, Press Release, Technology Awards
0 Comments

Attivo Networks announced today that its ThreatMatrix Platform, which is comprised of Attivo BOTsink engagement servers, decoys, and deceptions, a Multi-Correlation Detection Engine (MCDE), the ThreatStrike end-point deception suite, and the Attivo Central Manager (ACM), has earned Common Criteria Evaluation Assurance Level 2+ (EAL2+) certification, according to...

Measuring the Effectiveness of Your Security Controls

Reading Time: 4 minutes  |  Published: March 6, 2017 in Blogs, Threat Research
0 Comments

Performing regular assessments to determine the efficacy of security programs is foundational to understanding the reliability of programs, security gaps, compliance issues, and whether security technology is ending up as “shelfware”. To gain continued program support and funding, information security teams are expected to...