AST June 2018 Magazine Volume 24 | Page 74

duction environment seamless- June 2018 Edition ly, making it impossible for the attacker to discern which systems are deceptive. Volume 24 Endpoint deceptions will also validate with Active Directory to ensure the utmost authenticity of the deception credentials. Attivo offers 50 various out of the box deception campaign options to support environmental authen- ticity. Scalability Customer deception deploy- For example, a customer shared it took 15% of one ments range from small environments of person’s time over a day to deploy and didn’t require 30 people up to global Fortune 100 orga- additional staff to manage ongoing operations. nizations. Attivo Networks ThreatDefend™ Deception and Response Platform Authenticity The platform is recognized for its comprehen- sive network and endpoint deceptions that are Maintaining decoy, credential, and decep- field-proven for deployment in user networks, tion object authenticity and attractiveness data centers, cloud, ROBO, and specialty environ- is core to the efficacy and manageability ments such as IoT, ICS-SCADA, POS, telecom and more. of deception. Customers have purchased virtual, cloud, or hardware ap- The ThreatDefend platform uses real operating pliance systems for network deception and agentless end- systems and offers the ability to use the compa- point technology that is customer-proven with millions of ny’s production golden images to match the pro- endpoint deceptions deployed. Attivo Networks DecoyDocs 72