Customer Experiences in Real-World Deception Deployments
In this webinar, you will have the unique opportunity to hear from three behind-the-mask security practitioners who are actively using Attivo Networks deception technology in very different environments.
One customer comes from a large organization with a very mature and robustly resourced security team and infrastructure.
We also have a customer from an organization with a highly diverse, dynamic, and open environment by necessity.
Our last participating customer has a developing infrastructure that was built entirely from the ground up.
We take you through a number of detection alerts identified through Attivo Networks deception technology, such as network, credential, insider, Active Directory, Man-in-the-Middle, ransomware, 3rd party, and even remote worker-based attacks.
Attackers have successfully used deception tactics to breach networks for years. They masquerade as employees, using deceptive measures and stolen credentials to infiltrate a network, remaining undetected for lengthy periods of time. Deception technology shifts power back to the defenders with the ability to deceive and misdirect an attacker into revealing themselves. This is achieved without false positive alert fatigue and the burden of operational overhead associated with traditional detection methods. Watch the webinar to hear from customers about why these companies have adopted deception and provide insights into sample customer alerts.
Sarah Ashburn, SVP of Sales and Customer Success, Attivo Networks
Robert Crisp, VP of Field Technical Operations, Attivo Networks
Chris Roberts, Hacker