Suspect charged after Vancouver car ramming leaves 11 dead    Suspect in killing of general claims he was paid by Ukraine    North Korea confirms troop deployment to Russia for first time    Rock & Roll Hall of Fame picks Outkast but not Oasis    400-800 year old giant coral colony discovered within AMAALA waters in the Red Sea    Makkah police arrest Yemeni and Egyptian suspects of fake Hajj campaign    Kafalah grants 1,900 loan guarantees worth over SR4.8 billion to SMEs during 1Q 2025    Council of Senior Scholars reaffirms performing Hajj without a permit is a sinful act    HR Ministry launches 'Ajeer Al-Hajj' service for seasonal work during Hajj 2025    stc reports strong first-quarter 2025 results with 11% rise in net profit    King and Crown Prince offer condolence to Iranian president over the deadly port explosion    Saudi Awwal Bank records SR2.1 billion net profit after zakat and income tax for 1Q25    Virgin Atlantic celebrates one month of nonstop service between London and Riyadh    Al Ahli cruise past Buriram into AFC Champions League Elite semi-finals    Duran leads Al Nassr past Yokohama Marinos into AFC Champions League Elite semi-finals    Saudi orchestra to perform at Sydney Opera House in May    Al Hilal thrash Gwangju to reach AFC Champions League Elite semi-finals    Saudi Theater Commission launches its Work and Learn Project in UK    The season has begun — and one comment shook us all    Average life expectancy in Saudi Arabia rises to78.8 years    Pakistani star's Bollywood return excites fans and riles far right    Veteran Bollywood actor Manoj Kumar dies at 87    Bollywood actress vindicated over boyfriend's death after media hounding    Grand Mufti rules against posting prayers and preaching in mosques on social media    Exotic Taif Roses Simulation Performed at Taif Rose Festival    Asian shares mixed Tuesday    Weather Forecast for Tuesday    Saudi Tourism Authority Participates in Arabian Travel Market Exhibition in Dubai    Minister of Industry Announces 50 Investment Opportunities Worth over SAR 96 Billion in Machinery, Equipment Sector    HRH Crown Prince Offers Condolences to Crown Prince of Kuwait on Death of Sheikh Fawaz Salman Abdullah Al-Ali Al-Malek Al-Sabah    HRH Crown Prince Congratulates Santiago Peña on Winning Presidential Election in Paraguay    SDAIA Launches 1st Phase of 'Elevate Program' to Train 1,000 Women on Data, AI    41 Saudi Citizens and 171 Others from Brotherly and Friendly Countries Arrive in Saudi Arabia from Sudan    Saudi Arabia Hosts 1st Meeting of Arab Authorities Controlling Medicines    General Directorate of Narcotics Control Foils Attempt to Smuggle over 5 Million Amphetamine Pills    NAVI Javelins Crowned as Champions of Women's Counter-Strike: Global Offensive (CS:GO) Competitions    Saudi Karate Team Wins Four Medals in World Youth League Championship    Third Edition of FIFA Forward Program Kicks off in Riyadh    Evacuated from Sudan, 187 Nationals from Several Countries Arrive in Jeddah    SPA Documents Thajjud Prayer at Prophet's Mosque in Madinah    SFDA Recommends to Test Blood Sugar at Home Two or Three Hours after Meals    SFDA Offers Various Recommendations for Safe Food Frying    SFDA Provides Five Tips for Using Home Blood Pressure Monitor    SFDA: Instant Soup Contains Large Amounts of Salt    Mawani: New shipping service to connect Jubail Commercial Port to 11 global ports    Custodian of the Two Holy Mosques Delivers Speech to Pilgrims, Citizens, Residents and Muslims around the World    Sheikh Al-Issa in Arafah's Sermon: Allaah Blessed You by Making It Easy for You to Carry out This Obligation. Thus, Ensure Following the Guidance of Your Prophet    Custodian of the Two Holy Mosques addresses citizens and all Muslims on the occasion of the Holy month of Ramadan    







Thank you for reporting!
This image will be automatically disabled when it gets reported by several people.



Attivo Networks ambushes attackers at the endpoint
Published in The Saudi Gazette on 01 - 06 - 2020

Attivo Networks, the award-winning leader in deception for cybersecurity threat detection, Monday announced new capabilities within its ThreatDefend Detection Platform that aim to anticipate methods an attacker will use to break out from an infected endpoint and ambush their every move. This unique approach to detection specifically focuses on reducing the time an attacker can remain undetected and the amount of effort required for an organization to restore environments to normal operations.
This new Endpoint Detection Net offering will also serve as a powerful protection force-multiplier for businesses using Endpoint Protection (EPP) and Endpoint Detection and Response (EDR) solutions by closing detection gaps and facilitating automated incident response.
Protecting endpoints and preventing the spread of infected systems is a critical concern for organizations of all sizes, with research revealing that attackers can move off of an initially compromised system in 4.5 hours, on average. Further, new research shows that the average dwell time — the time it takes to detect attackers operating within an enterprise network — increased an average of 10 days in 2019, from 85 to 95 days, highlighting the escalating requirement to secure endpoints and prevent an adversary from establishing a foothold.
As a result, CISOs and security managers are increasing their spending and allocating budget for network detection and response tools, staff skills training, and endpoint detection and response solutions.
"Endpoints are the new battleground, and well-orchestrated detection and response capabilities are an organization's greatest weapon against attackers," said Ray Kafity, vice president of META at Attivo Networks. "The new Endpoint Detection Net offering provides organizations of all sizes an efficient and effective way to derail an attacker's lateral movement before they can establish a foothold or cause material harm."
The Attivo Endpoint Detection Net product is tackling endpoint security challenges head-on by making every endpoint a decoy designed to disrupt an attacker's ability to break out and further infiltrate the network. It does this without requiring agents on the endpoint or causing disruption to regular network operations.
The company used historical attack data and the MITRE Att@ck framework as a way to understand the various methods attackers use to spread laterally from an endpoint and then created a comprehensive solution designed to stop them.
The Endpoint Detection Net solution elevates security control by accurately raising alerts and taking proactive measures to derail attackers. These capabilities include early attack detection based on:
• Unauthorized Active Directory queries from an endpoint. Attackers seeking information on privileged domain accounts, systems, and other high-value objects will now receive fake Active Directory results, which make an attacker's automated tools untrustworthy and further advancement futile as their efforts get redirected into a decoy environment.
• Theft of local credentials. Deceptive credential lures deploy on the endpoint, and attempted use by an attacker will breadcrumb attacks away from production assets and into a decoy environment.
• Attempts to compromise file servers by moving to mapped shares. Attacks will get thwarted by decoy file shares and systems. Attackers will also be actively engaged within the decoys, providing defenders time to isolate the systems and prevent further infection of malware or ransomware.
• Network reconnaissance to find production assets and available services. These activities will become challenging as decoys obfuscate the attack surface with systems that appear identical to production assets but are instead virtual landmines for an attacker.
• Man-in-the-Middle attacks where attackers try to steal credentials in transit. These attacks are traditionally difficult to identify; however, this solution delivers an innovative and quick means to detect and alert on them.
• Identifying the available attack paths that an attacker would take to move about the network. Organizations now gain visibility to at-risk credentials and avenues of lateral movement, as well as the insights needed to remove them before attackers can leverage any exposed or orphaned credentials.
Attivo Networks has continually strengthened its endpoint detection capabilities and has been recently named a ‘Hot Company' in Endpoint Security by Cyber Defense Magazine in its 2019 Global Awards. CISOMAG also honored the company for its innovation with inclusion in its Endpoint Security Power List that was released in November of 2019. — SG


Clic here to read the story from its source.