AST Digital Magazine June 2017 Digital-June | Page 27
Volume 13
“The FIPS 140-2 and Common Criteria testing
and evaluation process includes analysis of the
security architecture, vulnerability analysis, and
penetration testing of the products, as well as
analysis of the cryptographic algorithms imple-
mented by the products to test for compliance
with advanced cryptographic standards.
The Common Criteria certification of the Attivo
Networks’ solution is a significant accomplish-
ment that highlights Attivo Networks’ commitment
to offer secure and reliable products.”
Attivo ThreatMatrix deception
The ThreatMatrix deception solution is designed
for efficiency and friction-less deployment.
• The solution is not in-line, so it doesn’t require
process changes or network redesign to in-
stall.
• Organizations can be up and running de-
ception in under an hour and can make
their entire network a ubiquitous trap for
cyber attackers.
• Attivo deception is exceptionally comprehen-
sive and authentic, running real operating
systems and with full golden image custom-
ization to the production environment.
• Dynamic deception techniques and so-
phisticated deception lures deceive an at-
tacker into engaging regardless of wheth-
er the threat vector is a zero day, stolen
credential, ransomware, MiTM or insider
attack.
June 2017 Edition
• The platform seamlessly scales to support
user networks, datacenters, cloud, ICS-SCA-
DA, IOT environments and provides a cen-
tralized threat management console.
• Detection is based on deception vs. database
lookup or pattern matching, eliminating the
need to cull through logs and deal with false-
positive alerts.
• Attivo alerts are engagement-based and
substantiated with attack details, which
simplify incident response and negate the
need for additional resources to operate
the solution and respond to an incident.
• Attivo provides its own sandboxing technol-
ogy that analyzes and provides forensic re-
porting of each attack.
• Full TTP information, infected IP address-
es, signatures and other attack detail re-
quired to isolate and block an attacker are
immediately provided, dramatically accel-
erating incident response and automating
response actions with firewalls, NACs,
SIEMs per an organization’s preference.
• Customers regularly cite the time savings
of the ThreatMatrix analysis engine, which
automates the analysis and reporting of
advanced malware and suspicious phish-
ing emails.
• ThreatPath™ attack prevention reporting pro-
vides continuous visibility into a company’s
vulnerabilities and weak links by highlighting
attack path risks based on misconfigurations
or credentials on non-designated computers,
by showing the infected endpoints, and au-
tomating trouble ticket requests for systems
needing remediation.
• Deception is a game changer in both its high
efficacy and in efficiency to operate and most
impressively at a cost that doesn’t break the
bank.