sb-nz logo
Story image

Attivo integrates with Azure for greater IoT threat protection

Attivo Networks has integrated with Microsoft Azure Security Center for IoT. Together the organisations will deliver a solution designed for detection and response to attackers targeting Azure IoT Edge devices.

Attivo Networks is a specialist in cybersecurity threat detection. This integration extends the ThreatDefend platform to up the ante for security on the Azure service.

According to Microsoft, the intelligent edge is a prime target for attackers, and as such Azure IoT Edge actively addresses these risks by collaborating with security companies such as Attivo who are proficient at detecting attackers in these emerging environments.

The integration provides customers a reliable way to detect, redirect, and respond to in-network attackers.

Attivo Networks VP security research Venu Vissamsetty says, “Efficiently detecting cloud-based attacks on containers and Internet of Things (IoT) devices remains a significant challenge for legacy security controls.

“We are excited to partner with Microsoft to deliver the visibility, early detection, and accelerated response that organisations need to combat advanced attackers and leverage the maximum benefits of the Intelligent Edge.”

Microsoft CTO and GM cloud and AI security division, Michael Braverman-Blumenstyk says, “At Microsoft, were committed to providing a trusted, easy-to-use platform that allows customers to securely build and unlock the value of their IoT deployments.

“Our collaboration with Attivo Networks strengthens the security framework of Azure Security Center for IoT Edge with effective, deception-based detection, enabling organisations to meet evolving security needs.”

Azure IoT Edge is a managed service based on Azure IoT Hub. Utilising this, Organisations can deploy cloud workloads to run on IoT edge devices via standard containers.

By moving certain workloads to the edge of the network, devices spend less time communicating with the cloud, react quicker local changes, and operate reliably even in extended offline periods, Microsoft states.

The joint Attivo ThreatDefend and Azure IoT Edge solution deploys Azure IoT modules as decoys for early and accurate threat detection.

Security teams can also deploy ThreatDetect forwarders in remote IoT edge devices from the Azure IoT Hub console and project deception at scale across the enterprise cloud, IoT, industrial, and medical networks to protect their entire infrastructure.

This jointly developed solution is available in the Azure Marketplace. The Attivo ThreatDefend solution creates a fabric of deceptive assets that proactively deceive and redirect attackers into revealing themselves, the company states.

When attackers target IoT edge devices, attempting to conduct reconnaissance or move laterally, they will discover assets that appear identical to production systems.

Any active observation will cause the attack to be redirected into the deception environment, Attivo states.

The solution then raises an engagement-based alert that automatically notifies the Azure Security Center. Additionally, forensics and company-specific intelligence on the attack are gathered and can be used for understanding attacker methods, intent, and strengthening security defences, according to the company.

Story image
McAfee finds vulnerabilities in 'temi' the videoconferencing robot
Temi is commonly used in environments including businesses, healthcare, retail, hospitality, and other environments including the home.More
Story image
SMBs seeking service providers in face of rising cyber threats
SMBs are struggling with their cybersecurity solutions, with three quarters worried about being the target of a cyberattack in the next six months, and 91% considering using or switching to a new IT service provider if offered a better option.More
Story image
Shlayer malware proves Apple devices aren't as secure as you think
"Apple never talks about malware publicly, and loves to give the impression that its systems are secure. Unfortunately, the opposite has been proven to be the case with great regularity."More
Story image
Jamf extends Microsoft collaboration with iOS Device Compliance
Organisations will soon be able to use Jamf for Apple ecosystem management while using Azure Active Directory and Microsoft Endpoint manager to maintain conditional access.More
Story image
Fortinet’s ‘zero trust’ approach redefining security
Cornelius Mare, Fortinet A/NZ Director, Security Solutions, explains why taking a ‘zero trust network access’ approach to cybersecurity requires fully-integrated and comprehensive security services and policies.More
Story image
OT networks warned of vulnerabilities in CodeMeter software
Manufacturers using the Wibu-Systems CodeMeter third-party licence management solution are being urged to remain vigilant and to urgently update the solution to CodeMeter version 7.10.More