Posted inSecurity

Attivo Networks expands identity detection and response portfolio

New IDEntitleX solution delivers visibility to identity risks across endpoint, active directory environments, and cloud infrastructures

Red Hat, Nutanix partner to deliver open hybrid multi-cloud solutions
Red Hat, Nutanix partner to deliver open hybrid multi-cloud solutions

Attivo Networks has announced IDEntitleX, a new Cloud Infrastructure Entitlement Management (CIEM) solution, designed to deliver visibility and reduce the attack surface for identities and entitlements in the cloud.

With this new product introduction, Attivo said it becomes the only solution of its kind to provide end-to-end analysis of identity and entitlement exposures and risks on endpoints, Active Directory (AD), and the cloud.
“As organisations continue to adopt cloud infrastructure at an ever-increasing rate and human and non-human identities expand to match, CISOs must focus on identity-first security solutions that can keep pace with this growth,” said Venu Vissamsetty, VP of research at Attivo Networks.

“This CIEM solution gives security teams the optimal flexibility and visibility they need for continuous monitoring of identities, entitlements, as well as correlation across standard cloud-based services.”

The new IDEntitleX solution provides security teams with a unified view of identities and exposures across the organisation to address provisioning management challenges while maintaining operational effectiveness. This includes multi-cloud support for AWS and Azure and provides detailed entitlement visibility for users, applications, virtual machines, containers, serverless functions and other objects which attackers seek to target.

The Attivo Networks IDEntitleX solution offers the following benefits:

• Broadest range of cloud visibility: Understand exposures with identity and entitlement summaries across all platforms.
• Platform-specific cloud visibility: Monitor entitlements to key cloud services, such as AWS S3 and Azure Key Vault.
• End-to-end visibility: View endpoint, Active Directory, and cloud exposures from a centralised management console.
• Object-specific risk assessment: Isolate objects by risk and analyse the details of their entitlements.