Support Login.

7 + 3 =

 

deception technology Tag

Venture capital investments

14:14 16 October in Attivo News

Attivo Networks announced it has raised $21 million in Series C venture capital funding. The funding round was led by Trident Capital Cybersecurity with participation from existing investors Bain Capital Ventures and Omidyar Technology Ventures. The round of funding follows a $15 million Series B financing...

Attivo Networks® Takes Deception on the Road

09:00 13 October in Attivo News

Attivo Networks®, the award-winning leader in deception technology for cybersecurity defense, will take the ThreatDefendTM Deception and Response Platform on the road during the month of October. Deception is fast gaining acceptance within enterprises and government agencies in recognition of its accuracy and efficiency for detecting...

Attivo Funding Meets Soaring Threat Detection & Response Demand

17:00 12 October in Attivo News

Attivo Networks, the leader in deception solutions for cybersecurity defense, and a competitor in the 2017 ‘ASTORS’ Homeland Security Awards Program, today announced it has raised $21 million in Series C venture capital funding. The funding round was led by Trident Capital Cybersecurity with participation from...

Attivo Networks News

Attivo Networks® Tackles Cloud Threat Detection Gaps

06:00 20 September in Press Release

Attivo Networks® today announced that it has expanded its ThreatDefend™ Deception and Response Platform cloud data center detection support to include Azure deployment capability in addition to existing support for Amazon Web Services (AWS) and OpenStack. Additionally, the company announced its ThreatDirect™ solution, which is...

Attivo adds response capabilities to deception deployments

09:57 19 September in Attivo News

With its Deception and Response Platform, Attivo addresses the main weakness of most deception technology, having to rely on other programs to respond to an attack once revealed by the deception network. Deception technology, deploying fake assets inside real networks to trick and catch attackers, shows...