• Skip to main content
  • Skip to secondary menu
  • Skip to footer

Cyber Security Market

Cyber Security Technologies & Markets

  • Cyber Security Events 2022-2023
  • Market Reports
  • Sponsored Post
  • Make a Contribution
  • About
  • Contact

Multi-Cloud Threat Detection Innovations Drive Cyber Deception Growth

February 4, 2020 By CybersecurityMarket.com

Attivo Networks®, the award-winning leader in deception for cybersecurity threat detection, today announced significant market momentum for its cloud deception capabilities as new attack surfaces and security vulnerabilities continue to emerge within cloud-native or hybrid environments. Additionally, Cyber Defense Magazine recently named the Attivo ThreatDefend® Platform a ‘Best Product’ for cloud security based on its ability to detect reconnaissance and lateral movement quickly, misdirect attacks, and generate engagement-based alerts on threats inside multi-cloud and serverless environments.

“Securing cloud environments comes with its own set of very specific requirements,“ stated Srikant Vissamsetti, SVP, engineering of Attivo Networks. “We worked closely with our customer base to develop innovations that address the growing use of multi-cloud environments and the deployment of serverless technology. We are extremely pleased with the advantages our customers are experiencing in reducing their time to detection and speed in which they can respond to attacks.”

“Very rarely do you see technology that is both very easy to use and quick time to value – usually if you have one, you do not have the other,” said a CISO of a Fortune 500 Financial Services Firm. “Attivo was that unicorn technology where it was very easy to deploy and use. We were receiving value a few hours into our deployment.”

“We selected Attivo Networks for their global leadership and innovative work in threat detection technology,” said Gary Miliefsky, Publisher of Cyber Defense Magazine. “Data stored in the cloud is increasingly being targeted by both internal and external attackers,” he added. “We are impressed by Attivo’s ability to accurately and universally protect their client’s data and infrastructure, regardless of the cloud environment they have chosen.”

Validating the demand for deception-based detection, a recent Enterprise Management Associates survey found increased use of deception technology across the cloud (27%). These findings are consistent both with Attivo customer cloud deployments and as seen in a detection survey conducted in 2018 by Attivo Networks, where 62% of respondents rated cloud as the top attack surface of concern.

The 2019 SANS State of Cloud Security report further validated increasing cloud security challenges with 31% of organizations reporting that they had experienced unauthorized access to cloud environments or cloud assets by outsiders, compared with just 19% in 2017. To address this heightened risk, organizations are actively using deception technology to increase visibility and for early detection of attacks targeting cloud assets, data lakes, serverless and container-based architectures.

Leading detection innovation for the cloud, Attivo Networks has built customization solutions specifically for dynamic cloud environments and shared security models, so that customers can universally detect and defend against external, insider, and supplier threats found within Amazon Web Services (AWS), Microsoft Azure, Oracle Cloud, and Google Cloud Platforms (GCP).

Attivo cloud deception innovations include the ability to:

Place fake user and admin credentials and other access tokens that lure the adversary into the deception environment and raise an immediate alert of intrusion.
Set decoy landmines throughout the cloud network that trigger an alert when threat actors attempt to access decoy applications, storage buckets, databases, systems, or documents.
Create cloud-specific deceptions such as decoy storage buckets, containerized applications, cloud-based applications, and serverless functions to detect attacker activity targeting these objects.
Provide Active Directory (AD) deceptions that include fake AD environments, as well as the ability to alter query results to lead attackers to the decoys. Organizations can now conceal valuable enterprise resource information and derail attacks without impacting production as attackers will be unable to tell real from fake or to trust in their tools.
Redirect malicious activities and policy violations into the deception environment so that the organization can safely study the attack and gather Tactics, Techniques, and Procedures (TTPs), along with company-specific threat intelligence.
Offer a consolidated view of threats and facilitate third-party integrations for automated blocking, isolation, and threat hunting. Findings can also feed into standard SOC tools.
To learn more about how deception technology provides comprehensive cloud threat detection, visit the Attivo Networks website: cloud solutions.

Source: Attivo Networks
Attivo Networks®, the leader in deception technology, provides an active defense for early detection, forensics, and automated incident response to in-network attacks. The Attivo ThreatDefend® Deception Platform provides a comprehensive and customer-proven platform for proactive security and accurate threat detection within user networks, data centers, clouds, and a wide variety of specialized attack surfaces. The portfolio includes extensive network, endpoint, application, and data deceptions designed to misdirect and reveal attacks efficiently from all threat vectors. Advanced machine-learning makes preparation, deployment, and operations fast and simple to operate for organizations of all sizes. Comprehensive attack analysis and forensics provide actionable alerts and native integrations that automate the blocking, quarantine, and threat hunting of attacks for accelerated incident response. The company has won over 100 awards for its technology innovation and leadership. For more information, visit www.attivonetworks.com

Related

Filed Under: Cybersecurity Market Tagged With: Cyber Deception, Multi-Cloud Threat Detection

Footer

Recent Posts

  • A defense-in-depth approach is critical to reduce email risk
  • The Global Cyber Innovation Summit (GCIS), 27-28, 2022, Baltimore, Maryland
  • Hackers have broken into dozens of Russian institutions
  • The 13th Annual Billington CyberSecurity Summit, September 7-9, 2022, Washington Convention Center
  • Black Hat Announces Keynote Speakers for Black Hat Asia 2022 Hybrid Event, May 10–13 2022, Marina Bay Sands, Singapore
  • ISACA Conference North America 2022 hybrid event, 4-6 May 2022, New Orleans, LA
  • The third edition of the Barcelona Cybersecurity Congress (BCC), May 10-12, 2022, Barcelona
  • The Official Cyber Security Summit in Miami on April 7, 2022
  • Black Hat Europe 2021 Announces Keynote Speakers & Releases Full Event Schedule, November 8-11, 2021, ExCeL London
  • Cyber Cartels, Ransomware, AI, & Cryptocurrency Among Cyber Trends Explored at Billington Cybersecurity Summit, October 6-8, 2021

Media Partners

  • Opinion
  • Press Media Release
  • Briefly
  • OPINT
  • VPNW
  • S3H
  • Domain Aftermarkets

Media Partners

  • Technology Conferences
  • Event Sharing Network
  • Defense Conferences
  • Cybersecurity Events
  • Event Calendar
  • Calendarial
  • Domain Market Research

Copyright © 2015 CyberSecurityMarket.com

Technologies, Market Analysis & Market Research Reports

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie SettingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT