Attivo Networks Partner Integrations for an Adaptive Defense and Continuous Threat Management An adaptive security architecture is built upon the four core pillars of prediction, prevention, detection, and response as outlined in Capabilities of Gartner’s Adaptive Security Architecture: December 2015. The report sets an efficient structure for outlining why it is critical for solutions within each of these categories to share information and automate responses to build a stronger defense, improve policies, and to better meet compliance expectations. This paper will serve to share how Attivo Networks® solutions fit into this eco-system and strengthen an organization’s overall defense against cyber threats. The Attivo ThreatDefend™ Deception and Response platform is built to disrupt an attack, detect in-network threats, and to defend against all forms of known and unknown attackers. Predict the Attack Having a baseline understanding of your security infrastructure, compliance requirements, associated threat risks, and exposure are first steps in establishing an organization’s security posture and preparing for cyber threats. Each company’s ultimate “attack score” is by design different, since some are more targeted due to the value of their information or critical infrastructure. Others may be driven by compliance criteria, noting that compliance should never be mistaken for having a lock-tight security system. Another consideration should be based upon other factors such as ability to keep systems updated and of course the risk of human error. Windows XP-based systems are commonly used in hospitals and in critical infrastructure, which given their mission critical nature, are not able to be taken off-line for regular security patch and maintenance updates. This is also compounded by end of life-cycle product management where systems are often left operating well after a manufacturer stops updating its software. © 2017 Attivo Networks. All rights reserved. www.attivonetworks.com Inherent use of default passwords can also leave doors open for attackers. Human mistakes play an equal role in creating security backdoors. Sometimes it is simply an error of clicking on the wrong email or URL and other times, misconfigurations or weak passwords can be the cause. The ThreatDefend portfolio includes ThreatPath™, which provides organizations the ability to do vulnerability and attack path assessments. An attacker’s modus operandi is to use compromised credentials to gain network persistence and move laterally within the network to reach to their destination from the initial infection point. The Attivo ThreatPath solution will take an attacker’s view of the network and illustrate the paths which an attacker will most likely take to compromise a target asset. Drill down is provided so that policies and misconfigurations are understood and can be changed to mitigate risk. This also provides insight into the greatest points of vulnerability and where additional detection measures should be placed. The ThreatPath solution can be used as a form of continuous pentesting to understand ongoing risks that arise from network and end-point changes. Prevention The security fundamentals start with preventing attackers from being able to get into the networks. Typical prevention systems include firewalls, gateway, sandbox, network access control, endpoint security, and other systems that keep track of known attacks and block them from entering the network. Some will use intelligence to look for known attack patterns in addition to signatures to block these attacks. The ThreatDefend platform extends the value of prevention systems by sharing attack information and signatures of newly found attacks that can be manually or automatically applied to block and isolate an attacker. The Attivo solution integrates with major prevention vendors through APIs and/or their information sharing platforms, making it fast and efficient to set up and manage. Automation set up can be done within the Attivo Dashboard User Interface (UI) and can be as simple as adding the key id and setting the alert threshold for automation action. Alternatively, some automations can be set up from the prevention system vendor’s information sharing platform. Technology Integration Partners: Network Access Control: Endpoint Security: *ON ROADMAP © 2017 Attivo Networks. All rights reserved. www.attivonetworks.com Attack Prevention Integration Detection A modern day security posture assumes the network has been compromised and that there are infections within the network. Zero-day attacks, stolen credential, man-in-the-middle attacks, ransomware, phishing, and insider attacks are just some of the many ways that an attacker will get in to launch their attack. Alternative approach and detects attackers without the use of known attack patterns or signatures. Deception takes a new approach that uses decoys and lures to deceive and misdirect an attacker into engaging. Once an attacker is engaged the attack is forensically analyzed and attack information provided to alert security operations teams and to update prevention systems with the information to block and quarantine the attack. The Attivo ThreatDefend Portfolio includes the BOTsink Deception Platform, which is comprised of engagement servers, decoys, deception lures, analysis engine, and ThreatStrike End-point Deception Suite, which includes deception credentials, ransomware lures, phishing submission, and other active bait to attract an attacker into engaging. The ThreatDefend™ BOTsink Deception Platform • Is designed for user networks, data centers, cloud, IOT, and ICS-SCADA environments • Runs real operating systems, customizable services, and provides the ability to load golden images to match the production environment • Deceptions includes data, server, application, and Active Directory • Is available as an appliance, VM or cloud VM; a central manager (ACM) is also available to manage large deployments • Once an attacker is engaged, the BOTsink Multi-Dimensional Correlation Engine (MCDE) will safley allow the attack to playout within its VMs for forensic analysis including Tactics, Techniques, and Procedure (TTP) • Communications can also be opened with command and control to gain additional insight on tools and methods; this can also be very effective to gain understanding of polymorphic and time triggered events • Unlike a typical sandbox, there is no attack time limitation and security teams can let the attack play out as long as needed. The environment will automatically rebuild once the analysis session has ended • Man in the Middle attacks can also be forensically analyzed and advanced spoofing techniques are detected • Saves time and effort by automating analysis and reporting of phishing and malware attacks reducing the risk of human error that results from clicking on a suspicious attachment or URL © 2017 Attivo Networks. All rights reserved. www.attivonetworks.com The ThreatSrike™ End-point Deception Suite • Provides authentic Windows, Mac, and Linux deception lures • Deception credential bait will appear as user credentials, browsing credentials and cookies, email client credentials, SecureShell (SSH), and more • Ransomware deceptions will appear as networks drives to attackers • To simplify analysis of suspicious phishing emails, a plugin in can be automatically pushed to end-points so that users can easily submit suspicious emails • The suite is agent-less and can be deployed through the BOTsink server, ForeScout, Casper, and Microsoft Active directory The BOTsink Deception Platform has integrations with SIEM products to query and alert on usage of deceptive credentials in the enterprise. SIEM: *ON ROADMAP SIEM Integration: Unified Reporting and Stolen Credential Alerts Response Once an attack has been identified, the priority then becomes how fast can the attack be understood, isolated, and blocked from causing further harm. Today, there are many tools that operate in silos making it challenging for organizations to quickly shut down and remediate systems. In some cases, attack files need to be sent to vendors for signatures to be created and this can also cause delays in preventing further harm. The ThreatDefend Deception and Response Platform is designed to simplify and expedite this process creating full attack forensic analysis and providing infected IP addresses and C&C addresses so that the attack can be promptly quarantined and blocked. Attack forensics will also include the necessary information to understand what activity in the “Kill Chain” the attacker was executing and additional drill down to information so that SHA1 and forensic artifacts can be researched in other devices. Integrations with malware database companies such as Virus Total, provide additional attack reporting enrichment. © 2017 Attivo Networks. All rights reserved. www.attivonetworks.com Malware Database Providers: Integration Partners to Accelerate Incident Response Summary The Attivo ThreatDefend Deception and Response Platform plays a critical role in empowering an adaptive defense with real-time detection of threats, attack vulnerability assessments, attack forensic analysis, and the integrations to dramatically accelerate incident response. Technology integrations with partners serves as a force multiplier effect, which improves existing technologies, process, and resource productivity, making them better and ultimately reducing the time to detect and remediate an exploit or malicious threat actor. Working hand-in-hand with our partners, Attivo Networks will continue to expand its platform and 3rd party integrations to deliver the fastest detection and incident response to stop attackers in their tracks. About Attivo Networks Attivo Networks® provides the real-time detection and analysis of inside-the-network threats. The Attivo ThreatDefend™ Deception and Response Platform detects stolen credentials, ransomware, and targeted attacks within user networks, data centers, clouds, SCADA, and IoT environments by deceiving an attacker into revealing themselves. Comprehensive attack analysis and actionable alerts empower accelerated incident response. www.attivonetworks.com © 2017 Attivo Networks. All rights reserved. www.attivonetworks.com Attivo Networks, ThreatDefend, and ThreatPath are registered trademarks of Attivo Networks, Inc. All other trademarks are of their respective companies. Follow us on Twitter @attivonetworks
© Copyright 2026 Paperzz