AST September 2018 'ASTORS' Showcase Edition Sep 2018 Final (9.18.18) | Page 44

The Attivo Networks ® ThreatDefend™ Deception and Response Platform deserves this award recognition based upon its efficiency in immediately providing detection value by accurately alerting on attacker engagement or attempts to use deception credentials .
The solution also uniquely empowers organizations with capabilities that they cannot achieve with other security controls : the capacity to outmaneuver the attacker , force them to execute flawlessly , and ultimately derail their efforts using their beloved approach of deception .
Volume 27
Additionally , the ability to
September 2018 Edition
share attack information and automate incident response extends the value of existing security infrastructure .
( Learn More as Cybersecurity Expert Sarath Geethakumar shares his experience with deception technology in Attivo Network ’ s Behind the Mask Series .)

Summary

The Attivo Networks ® ThreatDefend™ Deception and Response Platform deserves this award recognition based upon its efficiency in immediately providing detection value by accurately alerting on attacker engagement or attempts to use deception credentials .

Alerts are engagement-based and substantiated , eliminating false positives and accelerating incident response .
Given its ease of operations and scalable design , no additional staff is required to deploy or operate the solution , preventing scope creep and unexpected expenses .

Overall , Attivo deception provides efficient and accurate detection alerts of insider ( employees , contractors , suppliers ) and external attacker activity early , saving time , energy , cost , and negative impact from breaches .

The solution also uniquely empowers organizations with capabilities that they cannot achieve with other security controls : the capacity to outmaneuver the attacker , force them to execute flawlessly , and ultimately derail their efforts using their beloved approach of deception .

Privilege escalation , abuse of privileged accounts and data exfiltration represent serious issues associated with insider security compromises .

42