Attivo Networks News

Endpoint Detection Tag

Attivo Networks ambushes attackers at the endpoint

Reading Time: < 1 minute  |  Published: June 2, 2020 in Attivo News
0 Comments

The Endpoint Detection Net solution elevates security control by accurately raising alerts and taking proactive measures to derail attackers. These capabilities include early attack detection based on: Unauthorised active directory queries from an endpoint. Theft of local credentials. Attempts to compromise file servers by moving...

Attivo Networks enhances its ThreatDefend Detection Platform

Reading Time: < 1 minute  |  Published: June 2, 2020 in Attivo News
0 Comments

The Endpoint Detection Net solution elevates security control by accurately raising alerts and taking proactive measures to derail attackers. These capabilities include early attack detection based on: • Unauthorized Active Directory queries from an endpoint. Attackers seeking information on privileged domain accounts, systems, and other high-value...

Attivo Networks ambushes attackers at the endpoint

Reading Time: 2 minutes  |  Published: June 1, 2020 in Attivo News
0 Comments

The Attivo Endpoint Detection Net product is tackling endpoint security challenges head-on by making every endpoint a decoy designed to disrupt an attacker’s ability to break out and further infiltrate the network. It does this without requiring agents on the endpoint or causing disruption to...

Webinar: The Role of Deception in Healthcare Networks

Reading Time: < 1 minute  |  Published: November 13, 2019 in
0 Comments

Join Errol Weiss, CISO at H-ISAC, Steve Hunter VP, Marketing at H-ISAC, and host Carolyn Crandall, Chief Deception Officer at Attivo Networks for a fireside chat on the role of deception technology in healthcare networks. The discussion will be tuned to real-world challenges and how...

Four things to know about Deception Technology and EDR

Reading Time: 3 minutes  |  Published: October 24, 2018 in Attivo News
0 Comments

Many will advocate that the cybersecurity battle is fought at the endpoint. Completely secure these devices and the attacker will not be able to advance their attack. This belief has fueled a new interest and focus on moving from endpoint protection (EPP) to endpoint detection...