Attivo Networks Blogs

Camouflage Tag

Attivo Networks® Announces Adaptive Deception Campaigns Delivering Operational Agility to Outmaneuver Attackers

Reading Time: 3 minutes  |  Published: October 23, 2017 in Press Release
0 Comments

Attivo Networks® today announced the release of its Adaptive Deception Campaigns, which use machine-learning to create and automate the deployment of campaigns that bolster deceptions to address the evolving threat landscape and ever-changing attack surface. Adaptive campaigns are unique to other security controls in that...

Attivo Networks Awarded Most Innovative Products by One Planet

Reading Time: 2 minutes  |  Published: February 4, 2017 in Attivo (Company), Award Wins, Blogs, BOTsink Solutions, Camouflage, Threat Detection, ThreatDefend, ThreatPath
0 Comments

While the year is only a few weeks old, Attivo Networks is starting 2017 off with several new achievements. Since the beginning of the year, we have announced an exciting new partnership with Check Point Software, released the results of our survey highlighting a dramatic...

Attivo Networks ThreatMatrix Platform Wins 2016 Award for Most Innovative Products

Reading Time: 2 minutes  |  Published: February 2, 2017 in Awards, Press Release, Technology Awards
0 Comments

Attivo Networks®, today announced it has won Silver in the 2016 annual One Planet Business and Professional Excellence Awards. The company’s ThreatMatrix Deception and Response Platform was named the Most Innovative Product of the Year for its advanced technology in information security threat detection...

Attivo Networks Launches Self-Learning Dynamic Security

Reading Time: < 1 minute  |  Published: October 3, 2016 in Attivo News, Showcase
0 Comments

Attivo Camouflage uses its home-developed Dynamic Behavioral Deception to generate lures and decoys that are identical to real assets. Attivo Networks specializes in messing up things inside IT systems—for would-be cyber-intruders, that is. The deception-security provider, which creates bogus, but believable copies of IT systems in...