2020 'Preview' Edition | Page 57

diate value by providing “eyes inside the network” visibility and accurate detection alerting based upon decoy engagement or attempts to use deception credentials, most notably early in the attack cycle. www.AmericanSecurityToday.com June 2019 - Edition 45 For years, attackers have successfully used deception tactics for breaching networks masquerading as legitimate employees, using stolen credentials and deceptive measures to infiltrate a network, all while remaining undetected for lengthy dwell times, challenging security teams as they have to be successful 100% of the time, whereas an attacker only has to get lucky once. It’s now time to turn the tables on attackers and use deception against them. To Learn how deception technology can help your organization solve their threat detection challenges, please visit please visit https://attivonetworks.com/. https://www.youtube.com/watch?v=aHpP-x7zhQg (Explore how deception technology is solving organization's threat detection challeng- es through the narrative of a wolf-in-sheep's-clothing. Courtesy of Attivo and YouTube.) 57