Search
Homepage Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Jobs HPE Zone Masergy Zenith Partner Program Newsroom Intel Partner Connect Digital Newsroom Dell Technologies Newsroom IBM Newsroom Juniper Newsroom The IoT Integrator NetApp Data Fabric Intel Tech Provider Zone

12 Big New Network And Endpoint Security Tools From The Black Hat 2019 Conference

Here's a look at 12 products released during the Black Hat 2019 conference that turn network assets into security devices, redirect attempted endpoint access into deception environments, and use machine-learning algorithms on network flows.

Back 1 ... 3   4   5   6   7   ... 13 Next
photo

Attivo Networks ThreatDefend Platform

New capabilities on the Attivo Networks ThreatDefend Platform monitor available services on production endpoints and redirect attempted access into a deception environment. Every endpoint on the network becomes a decoy and, when paired with Attivo's deception lures, locks down an attacker's ability to break out from the endpoint without getting caught.

As a result, defenders gain visibility into the attacker's tools, the use of malicious software, and attempted lateral movement, and are able to quickly quarantine infected systems. Creating a deception blanket over the endpoint ensures cybercriminals can't bypass or avoid detection regardless of the attack method they ultimately choose.

ThreatDefend Platform doesn't require agents on the endpoint or disruption to network operations, Attivo said. Attackers on average take just four and a half hours to move off an initially compromised system, making it critical to stop lateral movement so that the adversary can't establish a foothold.

 
 
Back 1 ... 3   4   5   6   7   ... 13 Next

sponsored resources