Customer Experiences in Real-World Deception Deployments

Logo
Presented by

Sarah Ashburn, SVP of Sales & Customer Success | Robert Crisp, VP of Technical Operations | Chris Roberts, Hacker | Customers

About this talk

In this webinar, you will have the unique opportunity to hear from three behind-the-mask security practitioners who are actively using Attivo Networks deception technology in very different environments. One customer comes from a large organization with a very mature and robustly resourced security team and infrastructure. We also have a customer from an organization with a highly diverse, dynamic, and open environment by necessity. Our last participating customer has a developing infrastructure that was built entirely from the ground up. We will take you through a number of detection alerts identified through Attivo Networks deception technology, such as network, credential, insider, Active Directory, Man-in-the-Middle, ransomware, 3rd party, and even remote worker-based attacks. Attackers have successfully used deception tactics to breach networks for years. They masquerade as employees, using deceptive measures and stolen credentials to infiltrate a network, remaining undetected for lengthy periods of time. Deception technology shifts power back to the defenders with the ability to deceive and misdirect an attacker into revealing themselves. This is achieved without false positive alert fatigue and the burden of operational overhead associated with traditional detection methods. Join the webinar to hear from customers about why these companies have adopted deception and provide insights into sample customer alerts.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (43)
Subscribers (5345)
Attivo Networks closes the cyber security detection deficit with dynamic deception that accurately and efficiently reveals in-network threats and their lateral movement.