AST Digital Magazine September 2017 AST Digital Magazine September 2017 | Page 33
Volume 16
es alert fatigue and will only alert based on sub-
stantiated attacker engagement.
This eliminates the false positives that
can drain a government IT team’s time
and resources.
Visibility tools also help agencies avoid and un-
derstand attacks by providing attack path vul-
nerability assessments and time-lapsed replays,
empowering teams with insight into attacker lat-
eral movement and security gaps.
September 2017 Edition
1. Being able to accelerate response actions
such as blocking, quarantine, and threat
hunting
2. Sharing threat intelligence information in or-
der to eradicate the threat and help other
agencies strengthen their defenses, and
3. Integrating products to create more value
from existing security controls.
Designed for scalability, the ThreatDefend plat-
form gives agencies the flexibility to start with
base detection capabilities and expand platform
usage based upon their business requirements.
ThreatDefend is Common Criteria EAL
2+ certified, FIPS 140-2 certified, and is
available for procurement on many pop-
ular federal contract vehicles, including
GSA Schedule.
For example, the Attivo ThreatDefend platform
will detect a breach, and share full attack tech-
niques, tactics and processes (TTP) with fire-
walls, SIEMs, NAC, and end-point devices, which
will block and isolate infected endpoints from the
network and prevent additional infection or harm.
There’s an old saying, “Be careful who you trust,
the devil was once an angel.”
In today’s environment where threats lurk every-
where and it’s well known that government agen-
cies are still modernizing their defense strate-
gies, it pays to be extra vigilant.
Attivo Networks Kill Chain
Moving forward, there are several trends that
government IT teams should be aware of as they
formulate and execute their security infrastruc-
ture strategies.
An adaptive defense that includes deception will
create a powerful adversary for the modern-day
attacker, derailing their attacks and increasing
their costs.
Enterprises have traditionally spent approxi-
mately 75 percent of their security budgets on
prevention solutions.
That ratio is now roughly 50/50 for prevention as
compared to detection.
It is in Government IT team’s best interest to mir-
ror that shift.
A second trend is that enterprise IT teams are
focused not just on detecting a threat, but:
(Hear More from the author Carolyn Crandall, on the philoso-
phy Behind Deception Technology. Courtesy of Attivo Net-
works and YouTube)
33