The Attivo Networks ® ThreatDefend™ Deception and Response Platform deserves this award recognition based upon its efficiency in immediately providing detection value by accurately alerting on attacker engagement or attempts to use deception credentials .
The solution also uniquely empowers organizations with capabilities that they cannot achieve with other security controls : the capacity to outmaneuver the attacker , force them to execute flawlessly , and ultimately derail their efforts using their beloved approach of deception .
Volume 27
Additionally , the ability to
September 2018 Edition
share attack information and automate incident response extends the value of existing security infrastructure .
( Learn More as Cybersecurity Expert Sarath Geethakumar shares his experience with deception technology in Attivo Network ’ s Behind the Mask Series .)
Summary
The Attivo Networks ® ThreatDefend™ Deception and Response Platform deserves this award recognition based upon its efficiency in immediately providing detection value by accurately alerting on attacker engagement or attempts to use deception credentials .
Alerts are engagement-based and substantiated , eliminating false positives and accelerating incident response .
Given its ease of operations and scalable design , no additional staff is required to deploy or operate the solution , preventing scope creep and unexpected expenses .
Overall , Attivo deception provides efficient and accurate detection alerts of insider ( employees , contractors , suppliers ) and external attacker activity early , saving time , energy , cost , and negative impact from breaches .
The solution also uniquely empowers organizations with capabilities that they cannot achieve with other security controls : the capacity to outmaneuver the attacker , force them to execute flawlessly , and ultimately derail their efforts using their beloved approach of deception .
Privilege escalation , abuse of privileged accounts and data exfiltration represent serious issues associated with insider security compromises .
42