AST September 2018 'ASTORS' Showcase Edition Sep 2018 Final (9.18.18) | Page 39
Attacks
with a scan of the network tack paths, analyze attacks,
and automate
Volume begin
27
September 2018 Edition
from the infected endpoint to locate the incident response through 3rd party integra-
asset and services an attacker wants to tar- tions.
get.
Detection
By turning the environment into a virtual “hall
of mirrors,” deception disrupts an attacker’s re- The ThreatDefend platform is designed
ality and imposes increased cost as they are for the most sophisticated human and
forced to decipher what is real versus fake.
automated attackers and is unique in that
One small mistake will reveal the attacker’s it offers endpoint, network, data, appli-
presence and force them to start over or aban- cation, Active Directory, and database
don their efforts altogether.
deceptions to detect ever-changing attack
methods.
The ThreatDefend approach also addresses
the debate of whether deception is best suit- Both small and large organizations can benefit from
built-in machine-learning, which automates de-
ed at the endpoint or in network.
ployment and simplifies operations by auto-propos-
ing deception campaigns.
Simply put, you need both to catch all
threat vectors and their attempts of This maintains the highest levels of authenticity
reconnaissance or credential theft.
and provides an automated refresh of the decep-
tion environment in order to amplify deceptions
Additionally, ThreatDefend high-interac- based on user behavior, reset the attack surface
tion deception technology engages attack- on-demand, avoid fingerprinting, or simply reset
ers to gain threat intelligence, identify at- the attack surface after a compromise.
37