July 2019 AST Magazine AST July 2019 Magazine | Page 9
www.AmericanSecurityToday.com
July 2019 - Edition 35
(See how the Attivo’s ThreatPath™ solution provides an attack path vulnerability assessment
based on likely attack paths that an attacker would traverse through misconfigured systems or cre-
dential misuse. A topographical illustration of the attack paths provides a straight-forward view
of how an attacker can move laterally once they have engaged with their first end-point system.
Clickable drill downs provide the details of weaknesses and IP addresses for systems needing
to be isolated and/or fixed. Integrations with prevention systems can be leveraged for automated
response actions and trouble tickets can be activated inside the dashboard.)
endpoint security, they have found
the ThreatDefend platform to be a
force multiplier, gaining visibility
and insight into endpoint attack-
Because deception technology is not er activity that has bypassed other
reliant signature lookups, pattern endpoint security controls.
Unlike signature or behavioral-based
security controls, deception-based in-
trusion detection occurs when the at-
tacker engages with a deceptive asset.
matching, or behavioral analysis, it
retains its effectiveness even against The key to successful deception lies
APTs and ever-changing attack meth- in creating decoys that appear iden-
tical to production assets and blend
ods.
As organizations shift their focus to
in seamlessly with the environment.
(Cont'd on Pg 10)
7