AST June 2018 Magazine Volume 24 | Page 72

Volume 24 June 2018 Edition One small mistake will reveal the attacker’s This maintains the highest levels of authenticity and pro- presence and force them to start over or aban- vides an automated refresh of the deception environment in order to amplify deceptions based on user behavior, re- don their efforts altogether . set the attack surface on-demand, avoid fingerprinting or simply reset the attack surface after a compromise. The ThreatDefend approach also address- es the debate of whether deception is best Active Defense Unlike other detection solutions, suited at the endpoint or in network. the ThreatDefend platform does not stop with a detection alert and goes further to provide or- Simply put, you need both to catch all threat vectors and ganizations with an Active Defense which gives their attempts of reconnaissance or credential theft. them a better understanding of the attacker Additionally, ThreatDefend high-interaction de- and automates incident handling. ception technology engages attackers to gain Based on engagement with an adversary, the Threat- threat intelligence, identify attack paths, analyze Defend solution safely collects attacker TTPs, IOCs, attacks, and automate incident response through and counterintelligence for insight into attacker ca- 3rd party integrations. pabilities, goals, and the information they are seek- Detection ing to exfiltrate. The ThreatDefend platform is designed for the most sophisticated human and automated attackers and is unique in that it offers end- point, network, data, ap- plication, Active Directory, and database deceptions to detect ever-changing attack methods. Both small and large organiza- (The Attivo ThreatPath™ solution provides an attack path vulnerability assessment based on likely attack paths that an attacker would traverse through misconfigured tions can benefit from built-in ma- systems or credential misuse. A topographical illustration of the attack paths pro- chine-learning, which automates vides a straight-forward view of how an attacker can move laterally once they have deployment and simplifies oper- engaged with their first end-point system. Clickable drill downs provide the details of weaknesses and IP addresses for systems needing to be isolated and/or fixed. Inte- ations by auto-proposing decep- grations with prevention systems can be leveraged for automated response actions tion campaigns. and trouble tickets can be activated inside the dashboard.) 70