• attivo Networks Threat Defend

    ThreatDefend Platform™

    Deception Technology for early post-compromise threat detection and accelerated incident response.
  • DECEIVE.

    Reveal In-network Threats

    • Attractive decoys
    • Credential lures
    • Ransomware bait
    • Data deceptions
  • DETECT.

    Early and Accurate Detection

    • Lateral movement and credential theft
    • Ever-changing threat landscape
    • Evolving attack surface
    • Internal and external threat actors
  • DEFEND.

    Accelerated Incident Response

    • Advanced attack analysis
    • Substantiated alerts
    • Automated incident response
    • Threat path visibility and attack visualization

Request a Demo - Attivo Networks

Contact Sales - Attivo Networks

Attivo Networks applies deception technology to outmaneuver and reveal in-network threats. The Attivo Networks ThreatDefend platform uniquely provides visibility throughout the attack lifecycle, detects activity overlooked by traditional security controls, and accelerates incident response with automated attack analysis and incident handling.


Deception for Real-Time Detection

Authenticity


Use of real operating systems, customizable services and import of organizations golden images, which include applications specific to the customer’s production environment to offer the highest level of authenticity.

Consistently outsmart Pen Testing teams; they are unable to detect that they are operating in a deception environment as decoys appear identical to production company servers or devices.

Scalability


Covers almost all operating systems and can be deployed in a cloud or datacenter environment to extend the reach of a BOTsink, particularly in micro-segmented networks. Organizations can now scale their adaptive defense across remote areas of their network with full-featured deception-based detection, automated attack analysis, and accelerated incident response capabilities.

Organizations can now detect all threat vectors, including Man-in-the-Middle, ransomware, stolen credential, and insider threats, in previously low visibility areas of their network.

Intelligence and Integration


Intelligent deployment and self-learning for ease of deployment, management and ensuring decoys accurately emulate devices and evolve with your network.

Integrations with other security vendors, actionable forensics and multiple data source event correlation and collaboration with playbooks for automated incident response.

High-interaction decoys appear identical to production company assets


User Data

  • Memory credentials
  • Active connections
  • Credential lures
  • SMB shares lures
  • Browser credentials
  • Application credentials
  • Vulnerable data in SMB Shares
  • PC, Mac, Linux deceptive credentials
Applications
  • FTP/SFTP
  • HTTP/HTTPS
  • Print
  • SMB
  • NBNS
  • SSH
  • SMTP
  • SWIFT
    Messaging
  • SNMP
  • Telnet
  • RDP
  • GIT
  • mDNS
  • MySQL
  • Apache
  • Tomcat
  • Jboss
  • SVN/CVS
  • Trac
  • Radius
  • NetBIOS
  • AD
  • Mongo DB
  • Elastic Search
ICS/SCADA
  • Modbus
  • BACnet
  • Siemens S7comm
  • IPMI
  • Common Industrial Protocol (CIP)
IoT/IoE
  • MQTT
  • CoAP
  • XMPP
  • Health Level-7
  • Digital Imaging & Comms in Medicine (DICOM)

Decoy Operating Systems/Types

XP*, 7, 8*, 10*
2008, 2016*, 2012*
12.04 & Later
IoT: Printer, Camera & much more
Router, Switch & VoIP

Platform

Networks Unlimited Uplogix

Get in Touch

Simone Tregurtha
Product Manager
  • This email address is being protected from spambots. You need JavaScript enabled to view it.

Subscribe now to receive our latest updates and promotions

Networks Unlimited
Offering the best and latest solutions within the converged technology, data centre, networking, and security landscapes.

Copyright 2019 Networks Unlimited | The Key to IT Security & Networking Communications.