sb-as logo
Story image

Attivo integrates with Azure for greater IoT threat protection

Attivo Networks has integrated with Microsoft Azure Security Center for IoT. Together the organisations will deliver a solution designed for detection and response to attackers targeting Azure IoT Edge devices.

Attivo Networks is a specialist in cybersecurity threat detection. This integration extends the ThreatDefend platform to up the ante for security on the Azure service.

According to Microsoft, the intelligent edge is a prime target for attackers, and as such Azure IoT Edge actively addresses these risks by collaborating with security companies such as Attivo who are proficient at detecting attackers in these emerging environments.

The integration provides customers a reliable way to detect, redirect, and respond to in-network attackers.

Attivo Networks VP security research Venu Vissamsetty says, “Efficiently detecting cloud-based attacks on containers and Internet of Things (IoT) devices remains a significant challenge for legacy security controls.

“We are excited to partner with Microsoft to deliver the visibility, early detection, and accelerated response that organisations need to combat advanced attackers and leverage the maximum benefits of the Intelligent Edge.”

Microsoft CTO and GM cloud and AI security division, Michael Braverman-Blumenstyk says, “At Microsoft, were committed to providing a trusted, easy-to-use platform that allows customers to securely build and unlock the value of their IoT deployments.

“Our collaboration with Attivo Networks strengthens the security framework of Azure Security Center for IoT Edge with effective, deception-based detection, enabling organisations to meet evolving security needs.”

Azure IoT Edge is a managed service based on Azure IoT Hub. Utilising this, Organisations can deploy cloud workloads to run on IoT edge devices via standard containers.

By moving certain workloads to the edge of the network, devices spend less time communicating with the cloud, react quicker local changes, and operate reliably even in extended offline periods, Microsoft states.

The joint Attivo ThreatDefend and Azure IoT Edge solution deploys Azure IoT modules as decoys for early and accurate threat detection.

Security teams can also deploy ThreatDetect forwarders in remote IoT edge devices from the Azure IoT Hub console and project deception at scale across the enterprise cloud, IoT, industrial, and medical networks to protect their entire infrastructure.

This jointly developed solution is available in the Azure Marketplace. The Attivo ThreatDefend solution creates a fabric of deceptive assets that proactively deceive and redirect attackers into revealing themselves, the company states.

When attackers target IoT edge devices, attempting to conduct reconnaissance or move laterally, they will discover assets that appear identical to production systems.

Any active observation will cause the attack to be redirected into the deception environment, Attivo states.

The solution then raises an engagement-based alert that automatically notifies the Azure Security Center. Additionally, forensics and company-specific intelligence on the attack are gathered and can be used for understanding attacker methods, intent, and strengthening security defences, according to the company.

Story image
Tanium and Google Cloud bring greater security to distributed IT
“This joint solution with Chronicle gives Tanium customers access to massively scalable analytics and investigation capabilities far beyond that of other endpoint detection and response point tools."More
Story image
Fortinet unveils firewall offering for hyperscale & 5G environments
The company continues to push the boundaries of hardware-accelerated performance for security and networking convergence.More
Story image
DDoS attacks bigger & more prevalent in Q2 2020 - Cloudflare report
Cloudflare recorded the ‘biggest ever’ attacks – 88% of all large (100 Gbps) attacks this year were launched after the lockdown period in March.More
Story image
AWS launches fully-managed fraud detection service
Businesses lose billions of dollars to online fraud every year, however businesses respond by investing in cumbersome fraud management solutions that often rely on hand-coded rules and are difficult to keep up to date.More
Story image
Improving network security by ‘deflecting’ cybercriminals
Even with the best perimeter defences in place, malicious actors can still gain access to a network and resources connected to it. But a new technique has made it significantly easier to spot these cyber-attackers.More
Download image
NFV adoption surges as firms seek to reduce network complexity
IT infrastructure has become more complex than ever, especially when it comes to networking and the reality of highly distributed infrastructures. That’s why many enterprises are turning to network functions virtualisation (NFV).More