Attivo Networks ThreatDefend Platform

Promote this Nomination

Additional Info

Company (that provides the nominated product / solution / service)Attivo Networks
Websitehttps://attivonetworks.com/
Company size (employees)100 to 499
Type of solutionHybrid

In 3 bullets, summarize why this product or service is different from the competition and deserves recognition:

The Attivo ThreatDefend platform deserves this recognition because it is the most comprehensive and scalable deception platform on the market. It uniquely covers prevention, detection, and automated incident response.

Prevention: Attivo prevents attackers from advancing their attacks by hiding and denying access to Active Directory objects, files, folders, credentials, and the data they seek. Additionally, Attivo identifies exposed attack paths and prevents attackers from fingerprinting an endpoint so they cannot find vulnerable ports and services to exploit. In addition to concealing target data, the solution also returns fake information to misinform attackers and derail their attacks. No other deception provider provides concealment and misdirection technology or prevents attack activities.

Detection: Attivo delivers the most comprehensive lateral movement and privilege escalation detection coverage with unparalleled deception authenticity and scalability across all attack surfaces (on-premises, remote worksite, cloud, serverless, IoT, other specialized environments). Golden-image uploads and emulations provide additional customization so that solutions can look like typical production endpoints and servers or network infrastructure, ICS, IoT, Medical IoT, POS, or even devices within energy substations. Attivo also provides deception for native cloud technologies and covers Active Directory at endpoints, domain controllers (on-premises and cloud-hosted), and Azure AD.

Incident Response: Attivo gathers and automatically correlates data from the attack, including memory forensics. Extensive third-party integrations and playbooks provide automated incident response and negate the need for additional resources to analyze and respond to an incident. Customers quote a twelvefold efficiency improvement when responding to an Attivo detection alert.

Brief Overview

Attivo Networks leads in deception technology innovation with hundreds of customers and global operations in North America, Europe, the Middle East, Asia, Australia, and Latin America. Customers cite successfully reducing cybersecurity risks by preventing privilege escalation, closing visibility gaps, and detecting lateral movement. The company has over 150 awards recognizing its products, leadership, and market impact. It is a Gartner, Inc. Cool Vendor and has scored the highest rankings in Gartner’s deception technology comparison report, with 13 out of the 14 categories receiving the highest scores possible. For four consecutive years, the company has garnered recognition on the Deloitte Fast500 list and has won Fast Company’s Best Workplaces for Innovators Awards.
The ThreatDefend solution efficiently addresses complex security challenges associated with sophisticated attackers:

1. Prevention of attack privilege escalation and data theft
2. Protection of Credentials, Active Directory, and Data
3. Accurate and substantiated detection of known and unknown threats
4. Scalable coverage for all attack surfaces
5. Comprehensive detection across all lateral movement attack methods
6. High-fidelity, easy to manage, and take action on alerts
7. Company-specific threat intelligence and vulnerability assessment
8. Serves as a force multiplier to existing controls: MITRE ATT&CK DIY Test confirms avg 42% boost in detection performance over EDR used alone
9. Highly effective for insider-, supplier-, and external threat detection – A joint survey with EMA found deception technology to be the top tool of choice for detecting insider threats

As the most comprehensive platform available, the ThreatDefend deception fabric provides scalable coverage of endpoints, networks, Active Directory, cloud (including access management, container, and serverless functions), data centers, remote worksites, IoT, medical IoT, ICS-SCADA, POS networks, and network infrastructure.

Ultimately, both small and large security teams gain visibility, detection, and response automation in a way that other deception or threat detection controls can’t achieve.

  • Vote for this Nomination
    (click the thumbs-up icon to cast your vote)

Browse Award Nominations