July 2019 AST Magazine AST July 2019 Magazine | Page 8

Deception technology plays a critical www.AmericanSecurityToday.com role in changing this paradigm by de- tecting attacks that have bypassed oth- er security controls, early and accurate- ly, regardless of the methods used to compromise the network. Since deception uses traps and lures to detect an adversary, the solution is not reliant on signatures or database look up. This makes deception scalable and capa- ble of reliably detecting attackers using ever-changing attack methods and tar- geting rapidly evolving attack surfaces. Deception technology provides July 2019 - Edition 35 the “eyes within the network” visibility to threats that have by- passed perimeter defenses. By laying a maze of decoys, lures, and mis-directions security teams can accurately and efficiently de- tect early reconnaissance, lateral movement, and credential theft, improving detection time and re- ducing attacker dwell time. This is where the Attivo Threat- Defend platform has proven its One simple touch of the deception environment provides a substantiat- value with its ability to detect ed alert with details of attempted ac- any attacker using any attack tions. vector on any attack surface. 6