AST Digital Magazine June 2017 Digital-June | Page 27

Volume 13 “The FIPS 140-2 and Common Criteria testing and evaluation process includes analysis of the security architecture, vulnerability analysis, and penetration testing of the products, as well as analysis of the cryptographic algorithms imple- mented by the products to test for compliance with advanced cryptographic standards. The Common Criteria certification of the Attivo Networks’ solution is a significant accomplish- ment that highlights Attivo Networks’ commitment to offer secure and reliable products.” Attivo ThreatMatrix deception The ThreatMatrix deception solution is designed for efficiency and friction-less deployment. • The solution is not in-line, so it doesn’t require process changes or network redesign to in- stall. • Organizations can be up and running de- ception in under an hour and can make their entire network a ubiquitous trap for cyber attackers. • Attivo deception is exceptionally comprehen- sive and authentic, running real operating systems and with full golden image custom- ization to the production environment. • Dynamic deception techniques and so- phisticated deception lures deceive an at- tacker into engaging regardless of wheth- er the threat vector is a zero day, stolen credential, ransomware, MiTM or insider attack. June 2017 Edition • The platform seamlessly scales to support user networks, datacenters, cloud, ICS-SCA- DA, IOT environments and provides a cen- tralized threat management console. • Detection is based on deception vs. database lookup or pattern matching, eliminating the need to cull through logs and deal with false- positive alerts. • Attivo alerts are engagement-based and substantiated with attack details, which simplify incident response and negate the need for additional resources to operate the solution and respond to an incident. • Attivo provides its own sandboxing technol- ogy that analyzes and provides forensic re- porting of each attack. • Full TTP information, infected IP address- es, signatures and other attack detail re- quired to isolate and block an attacker are immediately provided, dramatically accel- erating incident response and automating response actions with firewalls, NACs, SIEMs per an organization’s preference. • Customers regularly cite the time savings of the ThreatMatrix analysis engine, which automates the analysis and reporting of advanced malware and suspicious phish- ing emails. • ThreatPath™ attack prevention reporting pro- vides continuous visibility into a company’s vulnerabilities and weak links by highlighting attack path risks based on misconfigurations or credentials on non-designated computers, by showing the infected endpoints, and au- tomating trouble ticket requests for systems needing remediation. • Deception is a game changer in both its high efficacy and in efficiency to operate and most impressively at a cost that doesn’t break the bank.