18.05.2021 Views

Cyber Defense Magazine Special Annual Edition for RSA Conference 2021

Cyber Defense Magazine Special Annual Edition for RSA Conference 2021 - the INFOSEC community's largest, most popular cybersecurity event in the world. Hosted every year in beautiful and sunny San Francisco, California, USA. This year, post COVID-19, virtually with #RESILIENCE! In addition, we're in our 9th year of the prestigious Global InfoSec Awards. This is a must read source for all things infosec.

Cyber Defense Magazine Special Annual Edition for RSA Conference 2021 - the INFOSEC community's largest, most popular cybersecurity event in the world. Hosted every year in beautiful and sunny San Francisco, California, USA. This year, post COVID-19, virtually with #RESILIENCE! In addition, we're in our 9th year of the prestigious Global InfoSec Awards. This is a must read source for all things infosec.

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Organizations can also pair Attivo Threat Path technology to gain visibility from the endpoint. The solution<br />

provides topographical maps to easily view credential exposures, misconfigurations, and other risks that<br />

attackers can exploit to gain domain control.<br />

Putting this all into action, here are a couple of key use cases.<br />

• Creation or expansion of a company’s Domain Assurance program, regardless of size or program<br />

maturity.<br />

• ADAssessor addresses and simplifies the following Domain Assurance dependencies with<br />

continuous visibility to exposures, misconfigurations, and attacks targeting Active Directory. It<br />

can also extend and automate AD expertise, expanding the breadth of people who understand<br />

the organization’s AD, automating processes <strong>for</strong> more in-depth assessment, and provides context<br />

to remediate vulnerabilities faster<br />

• ADSecure also efficiently hides AD objects from attackers. When an unauthorized query comes<br />

into AD, the solution only returns fake in<strong>for</strong>mation designed to lead them into a decoy that safely<br />

observes and collects the attacker’s actions. ADSecure can also run-in alert-only mode.<br />

• Ransomware mitigation is another prevalent use case <strong>for</strong> Active Directory protection. Here, there<br />

are 3 ways to efficiently derail ransomware attacks using Attivo technology.<br />

• The first is to hide the data they seek. With Attivo’s unique DataCloak function, attackers cannot<br />

see or access the files, folders, mapped and removable drivesthey seek.<br />

• Next, stand up fake data that will show instead of the real in<strong>for</strong>mation. When the attacker attempts<br />

to engage with the fake data, a high interaction engine occupies the attacker, providing distraction<br />

and time to isolate the infected system from the network.<br />

• The third is preventing the attacker from gaining control of Active Directory, stopping them from<br />

gaining the privileges they need to distribute malware to other endpoints or using lateral<br />

movement techniques as part of their attack<br />

• In each scenario, the Attivo solution captures the unauthorized commands and the processes that<br />

spawned them<br />

93

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!