Attivo Networks Blogs

deception technology Tag

Attivo Networks Enhances Platform to Detect All Classes of Cyber Threats

Reading Time: 2 minutes  |  Published: January 27, 2016 in Attivo (Company), Blogs, BOTsink Solutions, Threat Detection
0 Comments

This week, Attivo Networks™ announced it has expanded its deception platform to include all classes of cyber threats, including reconnaissance, stolen credentials, phishing and ransomware attacks. The goal is nothing less than to defend Attivo customers from every form of cyber attack with real-time...

Attivo Networks Named Finalist for Info Security Products Guide’s 2016 Global Excellence Awards

Reading Time: < 1 minute  |  Published: January 26, 2016 in Attivo News
0 Comments

Attivo Networks®, an innovator in deception technology for cyber security defense, was selected as a finalist for the 12th Annual 2016 Global Excellence Awards in the Deception Based Security category. These prestigious global awards recognize security and IT vendors with advanced; groundbreaking products and solutions...

Attivo Networks Named Finalist for Info Security Products Guide’s 2016 Global Excellence Awards

Reading Time: 2 minutes  |  Published: January 19, 2016 in Awards, Press Release, Technology Awards
0 Comments

Attivo Networks was selected as a finalist for the 12th Annual 2016 Global Excellence Awards in the Deception Based Security category. These prestigious global awards recognize security and IT vendors with advanced; groundbreaking products and solutions that are helping set the bar higher for others...

Attivo Networks Announces Real-Time Cyber Attack Detection for SCADA Devices

Reading Time: 3 minutes  |  Published: December 7, 2015 in Attivo (Company), Blogs, BOTsink Solutions, Energy
0 Comments

I am pleased to share that today Attivo Networks® announced a new release of its deception-based Attivo BOTsink® solution that provides continuous threat detection on Industrial Control Systems (ICS) SCADA devices used to monitor and control most manufacturing operations as well as critical infrastructure such...

Why Even the Best Cyber Security Solutions Fall Short

Reading Time: 4 minutes  |  Published: November 9, 2015 in Blogs
0 Comments

“A security solution is only as good as the weakest link” is one of those hackneyed phrases that keep popping up because it’s true. As the cyber attacks become increasingly sophisticated and numerous, the number of potential weak links also grows.Weak links can span...