Attacks/Breaches

2/12/2019
10:22 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Attivo Networks Introduces The Informer, a Deception-based Forensic Collection Solution

Enhancement to ThreatDefend(TM) Platform Delivers Adversary Intelligence, Dramatically Reducing a Defender's Response and Remediation Time

FREMONT, Calif.  February 12, 2019 – Attivo Networks®, the award-winning leader in deception for cybersecurity threat detection, today introduced the Informer solution, a deception-based forensic collection offering that delivers real-time forensics with enhanced visibility. As the latest expansion to the ThreatDefend™ Detection and Response platform, the Informer adds in-depth, and often hard-to-assemble views of the attacker’s activity to accelerate intelligence-driven response and remediation.

The Informer enhances customers’ ability to rapidly gather, understand, and disseminate adversarial intelligence critical to stopping an adversary, and effectively remediating and removing reentry points left by sophisticated and determined attackers. Collectively, these new ThreatDefend features significantly reduce security breach risk and strengthen businesses’ overall security posture by reducing the time required to find an attacker (dwell time) as well as respond to a threat (mean-time-to-remediation).

The average dwell time afforded an attacker currently averages around 100 days globally and demonstrates the complexity and challenges that organizations face in identifying threats before they become a breach. The length of time an attacker remains undetected in the network and the security team’s ability to understand the nature of the attack have a direct correlation to the time it takes- often months- to restore operations of infected systems and to make sure that all traces of the attack are completely removed and adversaries cannot successfully return.

“As attackers become more sophisticated, it’s critical to not only detect their presence but also gain valuable adversary intelligence to anticipate the attacker’s strategy,” said Tushar Kothari, CEO of Attivo Networks. “With the Informer solution from Attivo, defenders now have a more complete view of the attack, can predict where the attacker will move, and can adjust their defenses accordingly to mitigate the risk of a breach.”

The Informer solution is provided within the ThreatDefend™ platform and benefits the security analysts and incident response teams by

  • Delivering an accurate chronological session view of all attacker activity from specific IP addresses as well as host system and network characteristics.
  • Capturing forensic information inclusive of volatile memory, registry, and file changes along with lateral movement and network activities. This provides a consolidated view of the source of an attack for the analyst to access, reducing containment, eradication, and recovery times. Additionally, necessary access to forensic artifacts are presented in a clear, concise indexable manner that responders and analysts will recognize and can take action on.
  • Providing critical attack details such as memory forensics, endpoint activity, initial compromise intelligence, network packet captures, exploit code, targeted files and system logs that are all collated with a single view and can be easily accessed by all team members. The dashboard saves responders valuable time by displaying detection information in an actionable format and by organizing the attack data for faster intelligence analysis and a means to retrace attacker activities.
  • Displaying all lateral movement paths that the attacker has access to, showing potential target systems and open attack paths an attacker would try to compromise and exploit.
  • Triggering automated response through native integrations or predefined ThreatOps™ playbooks, accelerating incident response to increase efficiency and reduce effort.

By utilizing the Informer solution, organizations of all sizes will gain a demonstrable improvement in their ability to detect in-network threats quickly and to dramatically reduce a defender’s time to respond from hours to minutes.  With clear, concise, and consolidated adversary intelligence, post-incident activity readouts, remediation activities, and other necessary steps typically undertaken after a potential incident or breach will become more streamlined and actionable, saving organizations valuable time and cost.

To learn more about the Informer solution and how to apply its capabilities towards an Active Defense strategy for advanced threat detection, visit:https://attivonetworks.com/solutions/incident-response/ 

About Attivo Networks

Attivo Networks®, the leader in deception technology, provides an active defense for early detection, forensics, and automated incident response to in-network attacks. The Attivo ThreatDefend™ Deception Platform provides a comprehensive and customer proven platform for proactive security and accurate threat detection within user networks, data centers, clouds, and a wide-variety of specialized attack surfaces. The portfolio includes expansive network, endpoint, application, and data deceptions designed to efficiently misdirect and reveal attacks from all threat vectors. Advanced machine-learning makes preparation, deployment, and operations fast and simple to operate for organizations of all sizes. Comprehensive attack analysis and forensics provide actionable alerts, and native integrations that automate the blocking, quarantine, and threat hunting of attacks for accelerated incident response. The company has won over 70 awards for its technology innovation and leadership. For more information, visit www.attivonetworks.com.

 

####

 

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Crowdsourced vs. Traditional Pen Testing
Alex Haynes, Chief Information Security Officer, CDL,  3/19/2019
BEC Scammer Pleads Guilty
Dark Reading Staff 3/20/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Well, at least it isn't Mobby Dick!
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
The State of Cyber Security Incident Response
The State of Cyber Security Incident Response
Organizations are responding to new threats with new processes for detecting and mitigating them. Here's a look at how the discipline of incident response is evolving.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-9945
PUBLISHED: 2019-03-23
SoftNAS Cloud 4.2.0 and 4.2.1 allows remote command execution. The NGINX default configuration file has a check to verify the status of a user cookie. If not set, a user is redirected to the login page. An arbitrary value can be provided for this cookie to access the web interface without valid user...
CVE-2019-9942
PUBLISHED: 2019-03-23
A sandbox information disclosure exists in Twig before 1.38.0 and 2.x before 2.7.0 because, under some circumstances, it is possible to call the __toString() method on an object even if not allowed by the security policy in place.
CVE-2018-20165
PUBLISHED: 2019-03-22
Cross-site scripting (XSS) vulnerability in OpenText Portal 7.4.4 allows remote attackers to inject arbitrary web script or HTML via the vgnextoid parameter to a menuitem URI.
CVE-2019-1716
PUBLISHED: 2019-03-22
A vulnerability in the web-based management interface of Session Initiation Protocol (SIP) Software for Cisco IP Phone 7800 Series and Cisco IP Phone 8800 Series could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or execute arbitrary code. The vulnerability ...
CVE-2019-1763
PUBLISHED: 2019-03-22
A vulnerability in the web-based management interface of Session Initiation Protocol (SIP) Software for Cisco IP Phone 8800 Series could allow an unauthenticated, remote attacker to bypass authorization, access critical services, and cause a denial of service (DoS) condition. The vulnerability exist...