Support Login

For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

I agree to these terms.

 

ThreatDefend Tag

Attivo Networks® Receives Multiple Honors for Advanced Threat Detection Innovation in Cyber Defense Magazine’s 2019 InfoSec Awards

06:00 04 March in Company Awards, Press Release, Technology Awards
0 Comments

“As the cybersecurity industry gathers at RSA this week, we are honored to be recognized by the 2019 InfoSec Awards as a proven leader in deception solutions and in detecting advanced threats,” said Attivo Networks CEO, Tushar Kothari. “With the Attivo Networks platform, customers can...

cybersecurity excellence award 2019

Attivo Networks® Sweeps 2019 Cybersecurity Excellence Awards

06:00 25 February in Awards, Company Awards, Press Release, Technology Awards
0 Comments

Fremont, CA – February 25, 2019 –Attivo Networks took home five 2019 Cybersecurity Excellence Awards recognizing the company’s rapid growth and technology leadership. Attivo Networks won gold awards in the Fastest Growing Cybersecurity Company and Best Cybersecurity Startup categories. Additionally, the company’s ThreatDefend™ Deception and...

Attivo Networks

Attivo Networks® Introduces “The Informer,” a Deception-based Forensic Collection Solution

06:00 12 February in Press Release
0 Comments

Enhancement to ThreatDefend™ Platform Delivers Adversary Intelligence, Dramatically Reducing a Defender’s Response and Remediation Time FREMONT, Calif. – February 12, 2019 – Attivo Networks today introduced the Informer solution, a deception-based forensic collection offering that delivers real-time forensics with enhanced visibility. As the latest expansion...

An overview of the Attivo Networks solution

10:05 20 December in Attivo News
0 Comments

The Attivo Networks ThreatDefend solution is a deception-based platform that provides early and accurate detection of in-network threats and automation to accelerate attack analysis and incident response. The platform is based on decoys, lures, application, and data deceptions that misdirect, deter, and derail threats at initial compromise...