Intelligent CISO Issue 33 | Page 59

A deception and attacker lateral movement threat detection , announced innovative enhancements to its ThreatPath solution , part of the modular ThreatDefend Endpoint Detection Net ( EDN ) family of products . ThreatPath , which continuously observes and shows credential exposures , now also provides organisations with the ability to identify and automatically remediate high-risk exposures based on identities with excess privileges , application data sources , at-risk practices such as local admin credentials stored on the endpoint and shadow admin accounts .

Attivo Networks enhances portfolio for amplified Identity Access Management control

ttivo Networks , an awardwinning leader in cyber

A deception and attacker lateral movement threat detection , announced innovative enhancements to its ThreatPath solution , part of the modular ThreatDefend Endpoint Detection Net ( EDN ) family of products . ThreatPath , which continuously observes and shows credential exposures , now also provides organisations with the ability to identify and automatically remediate high-risk exposures based on identities with excess privileges , application data sources , at-risk practices such as local admin credentials stored on the endpoint and shadow admin accounts .

Many organisations start their incident response reactively after detecting a compromised system . For organisations to shift their security posture to be more proactive , they must understand what they are trying to protect and have visibility to know if they are exposed . The ThreatPath offering enhances this awareness by immediately showing the exposures that create risk .
Moreover , beyond just notifying the security teams of exposed credentials and misconfigurations , the solution facilitates automatic remediation before attackers can take advantage of them . It takes little effort to deploy , so even organisations without a mature visibility programme can immediately benefit from understanding their credentialbased vulnerabilities and an attacker ’ s opportunities for lateral movement .
“ ThreatPath provides defenders with the visibility they need to address the mushrooming growth of endpoints and the challenges associated with
controlling attackers ’ unauthorised access ,” said Venu Vissamsetty , Attivo Networks Vice President , Security Research . “ Because the ThreatPath solution is persistent on the endpoint , the visibility map is always up-to-date and accurate , providing real-time alerts as soon as newly created critical asset exposure paths emerge . This continuous coverage works hand-in-hand with the rest of the Attivo Networks EDN portfolio to quickly detect and prevent credential theft and Active Directory privilege escalation attempts .”
How it works
The ThreatPath solution uses both topographical maps and tables to give security teams visibility to exposed domain admin and cached user
credentials on all endpoints , RDP sessions to high-value servers , AWS access keys and connected at-risk devices . It also provides automatic remediation by removing the saved credentials , shared folders and vulnerabilities , including those in the cloud . Additionally , the security teams can further reduce risk by configuring ThreatPath to create path rules to high-value assets and leveraging its capabilities to report on these potential paths . The solution also provides drilldowns and searches based on time intervals , which is extremely valuable for discovering new local admin account additions . The result reduces the available credentials for attackers to leverage , improves access control and reduces the attack surface , eliminating the attack paths available to attackers . u
intelligent NETWORK SECURITY
www . intelligentciso . com
59