AST Digital Magazine September 2017 AST Digital Magazine September 2017 | Page 33

Volume 16 es alert fatigue and will only alert based on sub- stantiated attacker engagement. This eliminates the false positives that can drain a government IT team’s time and resources. Visibility tools also help agencies avoid and un- derstand attacks by providing attack path vul- nerability assessments and time-lapsed replays, empowering teams with insight into attacker lat- eral movement and security gaps. September 2017 Edition 1. Being able to accelerate response actions such as blocking, quarantine, and threat hunting 2. Sharing threat intelligence information in or- der to eradicate the threat and help other agencies strengthen their defenses, and 3. Integrating products to create more value from existing security controls. Designed for scalability, the ThreatDefend plat- form gives agencies the flexibility to start with base detection capabilities and expand platform usage based upon their business requirements. ThreatDefend is Common Criteria EAL 2+ certified, FIPS 140-2 certified, and is available for procurement on many pop- ular federal contract vehicles, including GSA Schedule. For example, the Attivo ThreatDefend platform will detect a breach, and share full attack tech- niques, tactics and processes (TTP) with fire- walls, SIEMs, NAC, and end-point devices, which will block and isolate infected endpoints from the network and prevent additional infection or harm. There’s an old saying, “Be careful who you trust, the devil was once an angel.” In today’s environment where threats lurk every- where and it’s well known that government agen- cies are still modernizing their defense strate- gies, it pays to be extra vigilant. Attivo Networks Kill Chain Moving forward, there are several trends that government IT teams should be aware of as they formulate and execute their security infrastruc- ture strategies. An adaptive defense that includes deception will create a powerful adversary for the modern-day attacker, derailing their attacks and increasing their costs. Enterprises have traditionally spent approxi- mately 75 percent of their security budgets on prevention solutions. That ratio is now roughly 50/50 for prevention as compared to detection. It is in Government IT team’s best interest to mir- ror that shift. A second trend is that enterprise IT teams are focused not just on detecting a threat, but: (Hear More from the author Carolyn Crandall, on the philoso- phy Behind Deception Technology. Courtesy of Attivo Net- works and YouTube) 33