• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Cybersecurity Market
  • Cybersecurity Events 2020-2021
  • Sponsored Post
  • Media Releases
  • About
  • VC
  • Contact

Cybersecurity Market

Cybersecurity Technologies & Markets

Cyber Deception Ranked Top Choice for Insider Threat Detection; Attivo Networks® Awarded for Solution Efficacy

November 21, 2019 By CybersecurityMarket.com

Attivo Networks®, the award-winning leader in deception for cybersecurity threat detection, today announced that it is experiencing accelerated customer demand for its insider threat detection solutions and that 40% of its customers are now citing deception within their top two use cases for the technology. A recent Enterprise Management Associates survey also announced that deception technology ranked as the top choice in security controls for accurately detecting insider threats, as compared to 12 other security solutions.

“While external attacks continue to command the most attention, it would be a mistake to overlook the threats that employees and suppliers represent. Many organizations now realize that their traditional defense systems aren’t designed to defend against insider threats,” said Srikant Vissamsetti, Senior Vice President of Engineering at Attivo Networks. “Applying Attivo Networks deception technology provides organizations with the tools to quickly and accurately detect policy violations and malicious insider activity. More importantly, it provides the substantiation needed to take decisive action.”

Furthermore, the company is continuing to achieve widespread industry recognition for its innovative approach to visibility and detection of human and automated attackers. Unlike other detections solutions, the Attivo Networks ThreatDefend™ Platform requires no signatures or behavioral analysis, but instead alerts on confirmed attacker interactions with decoy assets, providing accurate insiders threats detection. With many recognitions for its technical achievements, it adds another as Cyber Defense Magazine selected the Attivo ThreatDefendTM Platform as Editor’s Choice for ‘Insider Threat Detection’ in its 2019 Global Awards.

The challenges of effectively detecting and identifying malicious insider activity continue to grow as the methods of attackers evolve. This year’s Verizon Data Breach Investigations Report (DBIR) found that insider threat incidents have steadily risen since 2015. Additionally, the 2018 US Cybersecurity Insider Threat Report shows that 66% of organizations believe that malicious insider attacks or accidental breaches are more likely than external attacks.

Regardless of whether an attacker is a disgruntled or financially-motivated employee, contractor, or supplier, or an external actor using compromised credentials, security teams can use cyber deception to detect unauthorized network scans, credential theft and reuse, or attempts to access and steal data quickly. The company’s insider threat technology innovations include:

Deception decoy servers and devices, file shares, credentials, files, databases, and other decoy elements which are intermingled within the production environment and alert upon engagement
Application server decoys for detection of reconnaissance or alerting on the use of authorized credentials in unauthorized ways
Active Directory protection, which identifies unauthorized queries, diverts attackers to decoys and delivers the attacker misinformation to derail their attack
Deception for native cloud technologies, such as containers, serverless functions, and storage buckets
Through the use of its machine-learning, visibility to exposed credentials that create attack paths and access as well as unauthorized devices added to the network
Identification and substantiation of policy violations or malicious activity

Applying deception technology provides the tools an organization needs to quickly and accurately detect and identify suspicious or malicious insider activity. Security teams become better equipped with the data necessary to determine malicious intent and develop adversary intelligence. Plus, attack activity records and forensic evidence are recorded for support of administrative or legal proceedings, making it a powerful resource for reducing investigation time.

“Attivo Networks truly deserves this recognition for taking a bold approach to insider threat detection and response,” said Gary S. Miliefsky, Publisher, Cyber Defense Magazine. “The company received this award because it is continually trailblazing new and innovative ways of detecting and reducing the risk associated with insider threats.”

To learn more about how deception technology can effectively defend against insider threats, visit the Attivo Networks website or read the Insider Threat Paper.

About Attivo Networks
Attivo Networks®, the leader in deception technology, provides an active defense for early detection, forensics, and automated incident response to in-network attacks. The Attivo ThreatDefend® Deception Platform provides a comprehensive and customer-proven platform for proactive security and accurate threat detection within user networks, data centers, clouds, and a wide variety of specialized attack surfaces. The portfolio includes extensive network, endpoint, application, and data deceptions designed to misdirect and reveal attacks efficiently from all threat vectors. Advanced machine-learning makes preparation, deployment, and operations fast and simple to operate for organizations of all sizes. Comprehensive attack analysis and forensics provide actionable alerts and native integrations that automate the blocking, quarantine, and threat hunting of attacks for accelerated incident response. The company has won over 100 awards for its technology innovation and leadership. For more information, visit www.attivonetworks.com.

Share this:

  • Share
  • LinkedIn
  • Pinterest
  • Reddit
  • Facebook
  • Twitter
  • Tumblr
  • Pocket
  • Email

Related

Filed Under: Cybersecurity Market Tagged With: deception technology

Primary Sidebar

Add Sponsored Post
Post Tech Job

Featured Reports

  • U.S. Federal Cybersecurity Market Forecast
  • Quantum Computing Market Forecast
  • Modernization of U.S. Federal Government IT, Market Scenario
  • Face Recognition Technology Moves to the Edge
  • Electromagnetic Railgun Market Forecast
  • Deception Cybersecurity Market Forecast
  • High Energy Military Laser Market Forecast
  • Saudi Arabia Mass Surveillance Market Forecast
  • Ad Hoc Network Market Analysis
  • High-Assurance Cyber Military Systems (HACMS) Market Forecast
  • The Technological and Market Dimension of Info Operations and Warfare (Influence Operations), Market Estimates
  • Israeli Quantum Computing Market to Reach $1 Billion by 2024
  • Government Technology Markets: Next Frontiers
  • U.S. Federal IT Market Forecast
  • U.S. Federal Artificial Intelligence (AI) Market to Grow Dramatically
  • Adoption of Blockchain Technology By U.S. Government, Market Forecast
  • U.S. Government Background Check Market Forecast
  • Deep Packet Inspection (DPI): U.S. Government Market Forecast
  • Impact of Israeli Cybersecurity Technology on Selected Markets, Intelligence Report
  • Worldwide High Performance Computing (HPC) Market Forecast
  • U.S. Military Unmanned Aerial Vehicles (UAV) Market Forecast
  • Loitering Munitions Leverage the Battlefield, Market Analysis
  • Moving Target Defense Market Analysis
  • U.S.-Mexico Border Security & Protection Market Forecast
  • U.S. Federal IT Business Continuity and Disaster Recovery Market Forecast
  • U.S. Federal Cloud Computing Market Forecast
  • Government Cloud Computing Markets to Thrive
  • Worldwide Defense High Performance Computing (HPC) Market Forecast
  • U.S. Federal Government Mobility Market Forecast

Email Subscription

Enter your email address to subscribe to this website and receive notifications of new posts by email.

Footer

Media Partners

Technologies | Defense Conferences | Event Calendar | Exclusive | Technology Conferences | Market Research | Market Analysis

Technical Support

Templates | Press Media Release | Domain Market Research

Copyright © 2015 CyberSecurityMarket.com, Webdesign Template | A Bill of Rights for Users of the Social Web

loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.