TMCnet News
Attivo Gets Unconventional About Attack SurfacesFREMONT, Calif., Aug. 01, 2018 (GLOBE NEWSWIRE) -- Attivo Networks®, the award-winning leader in deception for cybersecurity threat detection, announced today that the company has enhanced its portfolio with new deception techniques designed to derail attacks targeting non-traditional attack surfaces. In addition to Internet-of-Things (IoT) and operational technology, attackers are now targeting devices and applications that can be harder to secure than standard servers and desktops. These devices and applications are increasingly being targeted by adversaries looking for the weak link in an organization’s network. The company’s new technology enhancements will provide organizations the comprehensive threat detection coverage required for today’s age of ever-evolving attack surfaces and threat landscape. This announcement builds upon the company’s current ThreatDefend™ deception portfolio, which already supports servers, cloud, user networks, and specialized environments such as IoT, SCADA, and POS. Attivo deception works by creating decoys, application, data, and credential bait designed to deceive and misdirect an attacker into engaging. Environmental authenticity is critical for tricking the attacker. Regardless of the operating environment, Attivo decoys can be set up to mirror match the production environment. This is achieved by creating decoys that share the same network characteristics and run the same operating systems, services, and applications as seen in the specific environment, making decoys indistinguishable from company assets. With traps and lures throughout the phases of an attack, deception quickly reveals an attacker’s presence in the network as they look to harvest credentials, recon the network or attempt to move laterally to escalate their attack. “It is clear that attackers are becoming increasingly sophisticated and with the strong adoption of deception technology, they are beginning to anticipate deception technology in corporate networks,” said Tushar Kothari, CEO of Attivo Networks. “As a result, it is imperative that deception is authentic to be attractive to attackers and effective at deceiving them. Attivo anticipated this and has added specialized device and application decoys for early detection of attacks and real-time visibility into attacker activity, regardless of threat vector.” Specialized Devices
Specialized Services and Applications
Adding native support for additional specialized services and applications increases the decoy’s out-of-the-box authenticity while giving organizations decoy capabilities that alert when attackers attempt to compromise them. These added capabilities increase the breadth and depth of Attivo deception. “As the attack surface continues to expand, organizations are increasingly seeking solutions that provide early detection and visibility for specialty environments,” said Rik Turner, Principal Analyst at Ovum. “Because of its efficacy, deception technology is now entering the mainstream and will soon be in the armory of most businesses. Attivo in particular provides highly authentic deception across an organization’s network, including difficult-to-secure environments such as IoT, network, and telephony infrastructure.” These new enhancements are also a direct response to reducing the time an attacker remains undetected in a network. This issue, known as dwell time, currently averages over 100 days (FireEye/Mandiant 2018 M-Trends report), which provides the time required for adversaries to successfully execute an attack. Unconventional attack surfaces can be difficult to secure and may not be monitored at the same levels as other devices, leaving exposed points of entry for attackers to establish a foothold and quietly exploit the network. The expansion of the ThreatDefend deception capabilities now provides the visibility and early detection for some of the most difficult entry points to secure, effectively reducing dwell time by quickly and accurately detecting threats. Resources: About Attivo Networks Contacts: Christina Adams Loren Guertin |