Attivo BoTsink prevents attacks over large attack surfaces
January 27, 2023

Attivo BoTsink prevents attacks over large attack surfaces

Rahul Deshmukh | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User

Modules Used

  • BOTsink
  • ThreatOps

Overall Satisfaction with Attivo BOTsink

Normally any threat in the network persists due to lateral movement and Attivo BoTsink detects exactly that and helps in machine learning based behaviour and blocking of threats. It projects decoys in such a way that it's difficult to distinguish with real assets of enterprise. This deception technique covers wide variety of attack surfaces and configurations for identical appearance
  • Detection of lateral movement
  • Deceptive projection of assets identical to production systems
  • Blocks threats over large attack surfaces
  • It helped reduce efforts of Cyber Security team by 20%
  • More fine tuning of threat detection capabilities needed
  • Users should be able to modify AIML configuration
  • Improving the display dashboard
  • Automated deployment
  • Detailed root cause analysis
  • Accelerated incident response
  • Helped reduce 20% of Security teams time in threat detection
  • Reduction of 40% of attacks
  • Automated deployment helped in improving efficiency of the team by 30%
Attivo BoTsink was selected based on cost price and wide coverage of detection capabilities. Our decision was primarily based on reducing efforts to identify and mitigation of attacks. The ease of deployment was additional factor in decision making. As compared to Zscaler Deception and SentinelOne Singularity I found Attivo BoTsink detects more threats

Do you think Attivo BOTsink delivers good value for the price?

Yes

Are you happy with Attivo BOTsink's feature set?

Yes

Did Attivo BOTsink live up to sales and marketing promises?

Yes

Did implementation of Attivo BOTsink go as expected?

Yes

Would you buy Attivo BOTsink again?

Yes

It is best suited when deployed at perimeter and integrated with SIEM and SOAR solution. It will be able to replicate assets and display realistic configurations making difficult for hackers. We were able to avoid or block 40% of attacks targetted to our critical servers and could easily identify threat actors.