Saturday, April 4, 2015

Tabula Rosa Systems Product Of The Day - Attivo Networks, Premiere BOTnet And APT Security Product

Attivo’s next-generation Honeynet technology 

One of our company's flagship products is Attivo Networks. It is the premiere  Honeynet Advanced Persistent Threat (APT) and BOT (an Internet robot) Sinkhole product available today. In today's cyber security network environment, it is an elegant and powerful way to remidiate any breach which occurs within a company's network. 

Don't delay another day. For a presentation, WebEx or additional information, please immediately contact

Attivo offers a new paradigm in security that complements and augments your existing security infrastructure—its technology lures, detects, engages, and analyzes APT and BOT attacks on your network. Here is a brief overview:
 APT and BOT Detection & Engagement
                VM based honeynet to attract APT and BOTs
                Engages with hosted services and apps
                Provides concise and actionable data
                Minimize the chances of APT or BOT outbreak
                User login anomalies
                Brute force login attacks
                Dropped payload
                Outbound network activity to C&C servers
Fast / Easy Deployment
                Configure unused IPs and subnets
                DHCP support
                Define white list
                Define log forwarder
Simple & Scalable
                Self-monitoring and self-healing
                Hosts virtual machines/servers and services
                DNS sinkhole / Sinkhole ProxyIOC & STIC ports
                                 Attivo’s BOTsink 2500 is an on-premise and in-cloud APT and BOT security appliance/VM designed to augment your existing security systems. The Attivo BOTsink System securely engages APTs and BOTs as they begin scanning network clients, servers, and services and then traps their activity in a secure sandbox. Once contained, the APTs and BOTs will not be able to communicate either within your network or outside your firewall. Instead, the Attivo BOTsink System captures and catalogues all attempted communications and propagation activity for future forensic using our patented Multi-Dimensional Correlation Engine.
                                 Captures All BOT and APT Activity
                                 BOTsinks are deployed on any subnet that has high value systems targeted by BOTs and APTs for IP and data theft or hosts BYODs. Typically deployed next to VPN gateway, client and server subnets - increasing detection velocity and minimizing the chances of cross contamination and contagion. Begin capturing BOT activity by assigning unused IP addresses to the BOTsink and add it to the network. The BOTsink identifies infected hosts mounting attacks, reports the time, type and anatomy of the attack to enable immediate remedial action, and gives visibility into the life cycle of the BOT. The BOTsink 2500 emulates the most common attacked network services and hosts up to 1,020 IP addresses to quickly attract and identify BOTs.


**Important note** - contact our sister company for very powerful solutions for IP management (IPv4 and IPv6), security, firewall and network management solutions:

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” will be published soon follow by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  Additionally, I provide content for an online newsletter via I have also established Netiquette discussion groups with Linkedin and Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. Further, I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and have been a contributor to numerous blogs and publications. 

Lastly, I am the founder and president of Tabula Rosa Systems, a company that provides “best of breed” products for network, security and system management and services. Tabula Rosa has a new blog and Twitter site which offers great IT product information for virtually anyone.

No comments:

Post a Comment