Saudi Founding Day celebrations set to light up 15 cities with cultural and artistic events    Netanyahu takes aim at West Bank after bus explosions near Tel Aviv    Body returned from Gaza is not Bibas mother, Israeli military says    Trump 'very frustrated' with Zelensky, says adviser    Hong Kong's main opposition party announces plan to dissolve    'Neighbors' canceled again, two years after revival    Al-Tuwaijri: Not a single day has passed in Saudi Arabia in 9 years without an achievement Media professionals urged to innovate in disseminating Kingdom's story to the world    LuLu Walkathon celebrates Saudi Founding Day, with promoting a message of sustainability    Saudi Founding Day: A legacy of strength, stability, and leadership    DGA Governor Al-Suwaian leads Saudi delegation to DCO meeting in Amman    Saudi Founding Day celebrates three centuries of legacy and leadership    King Salman approves official Saudi riyal symbol    Proper diet and healthy eating key to enjoying Ramadan fast    Trump praises Saudi Arabia's role in diplomacy and economic growth at FII Miami    Saudi Media Forum panel highlights Kingdom's vision beyond 2034 World Cup    AlUla Arts Festival 2025 wraps up with a vibrant closing weekend    Al Hilal secures top spot in AFC Champions League Elite, set to face Pakhtakor in Round of 16    Al-Ettifaq's Moussa Dembélé undergoes surgery, misses rest of the season    'Real life Squid Game': Kim Sae-ron's death exposes Korea's celebrity culture    Al Ahli defeat Al Gharafa to seal AFC Champions League Elite knockout berth    Bollywood star Saif Ali Khan 'out of danger' after attack at home in Mumbai    Order vs. Morality: Lessons from New York's 1977 Blackout    India puts blockbuster Pakistani film on hold    The Vikings and the Islamic world    Exotic Taif Roses Simulation Performed at Taif Rose Festival    Asian shares mixed Tuesday    Weather Forecast for Tuesday    Saudi Tourism Authority Participates in Arabian Travel Market Exhibition in Dubai    Minister of Industry Announces 50 Investment Opportunities Worth over SAR 96 Billion in Machinery, Equipment Sector    HRH Crown Prince Offers Condolences to Crown Prince of Kuwait on Death of Sheikh Fawaz Salman Abdullah Al-Ali Al-Malek Al-Sabah    HRH Crown Prince Congratulates Santiago Peña on Winning Presidential Election in Paraguay    SDAIA Launches 1st Phase of 'Elevate Program' to Train 1,000 Women on Data, AI    41 Saudi Citizens and 171 Others from Brotherly and Friendly Countries Arrive in Saudi Arabia from Sudan    Saudi Arabia Hosts 1st Meeting of Arab Authorities Controlling Medicines    General Directorate of Narcotics Control Foils Attempt to Smuggle over 5 Million Amphetamine Pills    NAVI Javelins Crowned as Champions of Women's Counter-Strike: Global Offensive (CS:GO) Competitions    Saudi Karate Team Wins Four Medals in World Youth League Championship    Third Edition of FIFA Forward Program Kicks off in Riyadh    Evacuated from Sudan, 187 Nationals from Several Countries Arrive in Jeddah    SPA Documents Thajjud Prayer at Prophet's Mosque in Madinah    SFDA Recommends to Test Blood Sugar at Home Two or Three Hours after Meals    SFDA Offers Various Recommendations for Safe Food Frying    SFDA Provides Five Tips for Using Home Blood Pressure Monitor    SFDA: Instant Soup Contains Large Amounts of Salt    Mawani: New shipping service to connect Jubail Commercial Port to 11 global ports    Custodian of the Two Holy Mosques Delivers Speech to Pilgrims, Citizens, Residents and Muslims around the World    Sheikh Al-Issa in Arafah's Sermon: Allaah Blessed You by Making It Easy for You to Carry out This Obligation. Thus, Ensure Following the Guidance of Your Prophet    Custodian of the Two Holy Mosques addresses citizens and all Muslims on the occasion of the Holy month of Ramadan    







Thank you for reporting!
This image will be automatically disabled when it gets reported by several people.



Attivo Networks ambushes attackers at the endpoint
Published in The Saudi Gazette on 01 - 06 - 2020

Attivo Networks, the award-winning leader in deception for cybersecurity threat detection, Monday announced new capabilities within its ThreatDefend Detection Platform that aim to anticipate methods an attacker will use to break out from an infected endpoint and ambush their every move. This unique approach to detection specifically focuses on reducing the time an attacker can remain undetected and the amount of effort required for an organization to restore environments to normal operations.
This new Endpoint Detection Net offering will also serve as a powerful protection force-multiplier for businesses using Endpoint Protection (EPP) and Endpoint Detection and Response (EDR) solutions by closing detection gaps and facilitating automated incident response.
Protecting endpoints and preventing the spread of infected systems is a critical concern for organizations of all sizes, with research revealing that attackers can move off of an initially compromised system in 4.5 hours, on average. Further, new research shows that the average dwell time — the time it takes to detect attackers operating within an enterprise network — increased an average of 10 days in 2019, from 85 to 95 days, highlighting the escalating requirement to secure endpoints and prevent an adversary from establishing a foothold.
As a result, CISOs and security managers are increasing their spending and allocating budget for network detection and response tools, staff skills training, and endpoint detection and response solutions.
"Endpoints are the new battleground, and well-orchestrated detection and response capabilities are an organization's greatest weapon against attackers," said Ray Kafity, vice president of META at Attivo Networks. "The new Endpoint Detection Net offering provides organizations of all sizes an efficient and effective way to derail an attacker's lateral movement before they can establish a foothold or cause material harm."
The Attivo Endpoint Detection Net product is tackling endpoint security challenges head-on by making every endpoint a decoy designed to disrupt an attacker's ability to break out and further infiltrate the network. It does this without requiring agents on the endpoint or causing disruption to regular network operations.
The company used historical attack data and the MITRE Att@ck framework as a way to understand the various methods attackers use to spread laterally from an endpoint and then created a comprehensive solution designed to stop them.
The Endpoint Detection Net solution elevates security control by accurately raising alerts and taking proactive measures to derail attackers. These capabilities include early attack detection based on:
• Unauthorized Active Directory queries from an endpoint. Attackers seeking information on privileged domain accounts, systems, and other high-value objects will now receive fake Active Directory results, which make an attacker's automated tools untrustworthy and further advancement futile as their efforts get redirected into a decoy environment.
• Theft of local credentials. Deceptive credential lures deploy on the endpoint, and attempted use by an attacker will breadcrumb attacks away from production assets and into a decoy environment.
• Attempts to compromise file servers by moving to mapped shares. Attacks will get thwarted by decoy file shares and systems. Attackers will also be actively engaged within the decoys, providing defenders time to isolate the systems and prevent further infection of malware or ransomware.
• Network reconnaissance to find production assets and available services. These activities will become challenging as decoys obfuscate the attack surface with systems that appear identical to production assets but are instead virtual landmines for an attacker.
• Man-in-the-Middle attacks where attackers try to steal credentials in transit. These attacks are traditionally difficult to identify; however, this solution delivers an innovative and quick means to detect and alert on them.
• Identifying the available attack paths that an attacker would take to move about the network. Organizations now gain visibility to at-risk credentials and avenues of lateral movement, as well as the insights needed to remove them before attackers can leverage any exposed or orphaned credentials.
Attivo Networks has continually strengthened its endpoint detection capabilities and has been recently named a ‘Hot Company' in Endpoint Security by Cyber Defense Magazine in its 2019 Global Awards. CISOMAG also honored the company for its innovation with inclusion in its Endpoint Security Power List that was released in November of 2019. — SG


Clic here to read the story from its source.