Digital Defense, Inc. has announced the availability of its Frontline.Cloud integration with Attivo Networks, the award-winning leader in deception for cybersecurity threat detection. Digital Defense’s Frontline.Cloud vulnerability management and threat assessment platform identifies high-risk/critical assets with business context that are highly vulnerable to exploits, remain unpatched, are unpatchable or have already been infected in real-time.

Integration with Attivo Networks

Frontline.Cloud is the industry's only true threat asset risk posture assessment app built for hybrid cloud environments

The integration with the Attivo Networks BOTsink solution allows administrators to quickly and confidently make strategic decisions on where to dynamically deploy additional deception technology assets to enhance their deception deployment and further misdirect attackers. This gives organizations the advantage of time to detect, analyze, and stop an attacker even as their risk posture and critical assets change.

Frontline.Cloud is the industry's only true on-demand vulnerability and threat asset risk posture assessment app built for hybrid cloud environments. Frontline.Cloud lets security teams focus on identifying and prioritizing the most important assets to proactively harden them against an attack without requiring agents.

Frontline.Cloud security platform

Frontline.Cloud utilizes data from the BOTsink solution to provide risk-based intelligence and for dynamically deploying additional deception technology assets to augment the current deception environment. Additionally, Frontline.Cloud enables security teams to be more effective in identifying compromised assets and assets under immediate attack in order to quickly misdirect attackers and prioritize remediation of the most important systems based on business context.

Securing IoT/ICS Networks

A significant security capability for ICS networks and critical infrastructure is drawing attackers away from these systems and detecting how they are trying to exploit vulnerabilities. This is especially true in environments where it is often a challenge to patch systems due to limited access and minimal maintenance windows or, in many cases, no patch for a known vulnerability is even available.

Attackers continue to exploit different types of vulnerabilities, compromised systems and blind spots in infrastructure"

Attackers continue to exploit different types of vulnerabilities, compromised systems and blind spots in infrastructure. We are now seeing them target critical infrastructure and IoT devices because of the difficulties in patching those assets,” said Larry Hurtado, CEO of Digital Defense. “Security teams have been challenged with identifying and tracking dynamically changing assets, understanding risk in real-time and prioritizing patching efforts, while Digital Defense provides the solution to help security teams address these challenges, it is now time to turn the tables on attackers.

Effect threat detection

Attivo has an extensive deception fabric for accurately detecting and derailing threats and the partnership with Digital Defense further ups the game against attackers,” said Tushar Kothari, CEO of Attivo Networks. “The ability to automatically deploy Attivo deception based on shared vulnerability insights provides a unique and innovative way to reduce risk while increasing the difficulty of an attack. It is a powerful example of how organizations can proactively strengthen their security posture while also building out an Active Defense.

Discover how AI, biometrics, and analytics are transforming casino security

In case you missed it

What Are Emerging Applications For Physical Security In Transportation?
What Are Emerging Applications For Physical Security In Transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher's Perimeter Solutions With Fortified Partnership
Gallagher's Perimeter Solutions With Fortified Partnership

Global security manufacturer Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years o...

Genetec's Role In Data Sovereignty For Security
Genetec's Role In Data Sovereignty For Security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...