July 2019 AST Magazine AST July 2019 Magazine | Page 9

www.AmericanSecurityToday.com July 2019 - Edition 35 (See how the Attivo’s ThreatPath™ solution provides an attack path vulnerability assessment based on likely attack paths that an attacker would traverse through misconfigured systems or cre- dential misuse. A topographical illustration of the attack paths provides a straight-forward view of how an attacker can move laterally once they have engaged with their first end-point system. Clickable drill downs provide the details of weaknesses and IP addresses for systems needing to be isolated and/or fixed. Integrations with prevention systems can be leveraged for automated response actions and trouble tickets can be activated inside the dashboard.) endpoint security, they have found the ThreatDefend platform to be a force multiplier, gaining visibility and insight into endpoint attack- Because deception technology is not er activity that has bypassed other reliant signature lookups, pattern endpoint security controls. Unlike signature or behavioral-based security controls, deception-based in- trusion detection occurs when the at- tacker engages with a deceptive asset. matching, or behavioral analysis, it retains its effectiveness even against The key to successful deception lies APTs and ever-changing attack meth- in creating decoys that appear iden- tical to production assets and blend ods. As organizations shift their focus to in seamlessly with the environment. (Cont'd on Pg 10) 7