Close
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Menu
Search
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Attivo Networks Claims First to Use Deception Security in IoT

    By
    Chris Preimesberger
    -
    June 1, 2016
    Share
    Facebook
    Twitter
    Linkedin

      New-gen security provider Attivo Networks, which mimics a real IT system using a deception approach that lures bad actors in and then traps them, has expanded its reach to serve the budding IoT (Internet of things) market.

      The Fremont, Calif.-based company has been successful for five years with its on-premises, server-loaded service and a cloud version on Amazon Web Services, but as of June 1 now offers its own brand of real-time threat detection and fast incident response specifically for IoT environments.

      This new enhancement to the Attivo service complements the company’s Deception Platform that already supports user networks, data centers, cloud and ICS-SCADA (Industrial Control Systems-Supervisory Control and Data Acquisition) environments, CEO Tushar Kothari told eWEEK.

      “Our architecture is designed to add capabilities, so we did not have to rebuild our software to add IoT use cases,” Kothari said. “Gartner (Research) forecasts that 6.4 billion connected things will be in use worldwide in 2016, up 30 percent from 2015, bringing a whole new set of cybersecurity risk and the need for real-time attack detection. The need is there for new ways to secure data.”

      First to Deploy Deception Security in the IoT?

      Thus, Kothari said, Attivo becomes the first IT security provider to utilize deception-type security in the IoT realm. “No one else is doing this,” Kothari said.

      IoT systems are groupings of network-connected devices that automatically collect and exchange data, allowing enterprises to increase efficiency and productivity. However, IoT networks also bring in a diverse set of connected devices that can introduce multiple points of vulnerabilities in the networks, Kothari said.

      “With the growing number of IoT devices in production networks, even minor security issues can turn into significant problems,” Kothari said. “This new surge of IoT devices will be a cyber attacker’s playground with introduction of new data exchange mechanism and traditional security infrastructure being ill equipped to prevent threat actors from using these devices as an onramp to their network.

      “Given the inability to run anti-virus or apply typical prevention measures, deception will play a critical role in the early threat detection and response to IoT cyberattacks.”

      High availability and safety are important attributes of IoT deployments; downtime of IoT sensors/network can cause significant damage to an organization, and, in some cases, public safety.

      Can Handle List of Security Challenges

      Some of the security challenges these devices bring include unauthorized access, weak encryption, targeted attacks exploiting vulnerabilities in vendor software, weak passwords, and others. Once inside a network, bad actors can use stolen credentials or move laterally to gain illegitimate access to company assets and information.

      Rich IoT targets include PACS (picture archive and communications system) servers that store critical patient data such as X-rays and other digital images, payment gateways for credit card processing, and other data gathering and aggregation frameworks.

      Attivo Networks’ Deception Platform is designed to detect cyber attackers, regardless of whether the attack is a targeted, stolen credential, ransomware, or insider threat, Kothari said. Customers can configure the Attivo Deception Platform to look identical to IoT systems based on XMPP, COAP, MQTT, HL7 and DICOM-based PACS servers in their networks, Kothari said.

      The Attivo BOTsink engagement servers and decoys can then be customized to appear as production IoT sensors and servers, deceiving attackers into thinking they are authentic. By engaging with decoys and not with production devices, the attacker reveals himself and then can be quarantined and studied for detailed forensics that can be used for remediation and future prevention.

      The Attivo Networks Deception Platform is available now. For more information, go here.

      Avatar
      Chris Preimesberger
      https://www.eweek.com/author/cpreimesberger/
      Chris J. Preimesberger is Editor-in-Chief of eWEEK and responsible for all the publication's coverage. In his 16 years and more than 5,000 articles at eWEEK, he has distinguished himself in reporting and analysis of the business use of new-gen IT in a variety of sectors, including cloud computing, data center systems, storage, edge systems, security and others. In February 2017 and September 2018, Chris was named among the 250 most influential business journalists in the world (https://richtopia.com/inspirational-people/top-250-business-journalists/) by Richtopia, a UK research firm that used analytics to compile the ranking. He has won several national and regional awards for his work, including a 2011 Folio Award for a profile (https://www.eweek.com/cloud/marc-benioff-trend-seer-and-business-socialist/) of Salesforce founder/CEO Marc Benioff--the only time he has entered the competition. Previously, Chris was a founding editor of both IT Manager's Journal and DevX.com and was managing editor of Software Development magazine. He has been a stringer for the Associated Press since 1983 and resides in Silicon Valley.

      MOST POPULAR ARTICLES

      Android

      Samsung Galaxy XCover Pro: Durability for Tough...

      Chris Preimesberger - December 5, 2020 0
      Have you ever dropped your phone, winced and felt the pain as it hit the sidewalk? Either the screen splintered like a windshield being...
      Read more
      Cloud

      Why Data Security Will Face Even Harsher...

      Chris Preimesberger - December 1, 2020 0
      Who would know more about details of the hacking process than an actual former career hacker? And who wants to understand all they can...
      Read more
      Cybersecurity

      How Veritas Is Shining a Light Into...

      eWEEK EDITORS - September 25, 2020 0
      Protecting data has always been one of the most important tasks in all of IT, yet as more companies become data companies at the...
      Read more
      Big Data and Analytics

      How NVIDIA A100 Station Brings Data Center...

      Zeus Kerravala - November 18, 2020 0
      There’s little debate that graphics processor unit manufacturer NVIDIA is the de facto standard when it comes to providing silicon to power machine learning...
      Read more
      Apple

      Why iPhone 12 Pro Makes Sense for...

      Wayne Rash - November 26, 2020 0
      If you’ve been watching the Apple commercials for the past three weeks, you already know what the company thinks will happen if you buy...
      Read more
      eWeek


      Contact Us | About | Sitemap

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Property of TechnologyAdvice.
      Terms of Service | Privacy Notice | Advertise | California - Do Not Sell My Information

      © 2021 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×