{"id":521378,"date":"2024-07-15T09:00:00","date_gmt":"2024-07-15T13:00:00","guid":{"rendered":"https:\/\/www.commvault.com\/?p=521378"},"modified":"2024-07-12T14:34:22","modified_gmt":"2024-07-12T18:34:22","slug":"attackers-overstay-their-welcome","status":"publish","type":"post","link":"https:\/\/www.commvault.com\/blogs\/attackers-overstay-their-welcome","title":{"rendered":"Attackers Overstay Their Welcome"},"content":{"rendered":"

The average dwell time – an attacker’s time in your environment before detection or executing their attack – is 204 days<\/a>. For nearly seven months, attackers move around stealthily, discovering valuable data, understanding your infrastructure and backup environments, and planting back doors that give them persistent access to your organization even if<\/em> you find and block them.<\/p>

Data protection requires shortening the time they have to tinker in your environment. This is the goal of most detection technologies that exist today. The problem, of course, is that most detection mechanisms generate far too many alerts to false-positive actions. This leads to wasted time and effort looking into things that are simply business as usual. It also causes major burnout for cybersecurity personnel who need to be at their best when combatting real cyber threats.<\/p>

Combat alert fatigue by improving alert fidelity<\/strong><\/h3>

Cyber analysts will agree that uncovering the needle in a haystack and thwarting an attacker is a real adrenalin booster. It’s why many people get into cyber investigations to begin with. Conversely, if you ask any analyst about the worst part of their job, it’s often responding to alerts that lead down rabbit holes to nowhere.<\/p>

A good way to improve your security posture and <\/em>employee morale is to invest in technologies that reduce tedious, rote tasks and stop your teams from chasing ghosts.<\/p>

But tuning detection tools to find the signal in the noise is tricky. You don’t want to throw out true alerts with false positives, but you also don’t want your analysts to investigate alerts that aren’t real. So, finding a better signal is key.<\/p>

Plant decoys in strategic places to trap attackers<\/strong><\/h3>

A good way to get that better signal is to use deception technologies. These technologies employ decoy assets in your environment that are never seen by legitimate users. Since decoys and traps are invisible to real, authorized users, when interactions occur with these decoys, Threatwise automatically issues high-confidence, high-fidelity alerts that indicate the presence of a malicious actor.<\/p>

This significantly cuts down on the noise from traditional security tools, allowing security personnel to focus on real threats. It minimizes the chance that Dave from accounting causes an alert by accidentally clicking on something he shouldn’t and increases the confidence that an alert was triggered by something that shouldn’t be there. These alerts can be seen in Commvault® Cloud and fed automatically to SIEM, SOAR, and other alert management tools to integrate seamlessly into your security operations workflows.<\/p>

Where should you place traps? Near critical data<\/strong><\/h3>

The kinds of traps and decoys you deploy in your environment should (1) look like they belong there, and (2) mimic things that an attacker would find appealing. To do both things, you need to place the decoys near data you want to protect and deploy enough of them that the chances that an attacker interacts with the trap and not the real data are high.<\/p>

Historically, it’s been difficult to spin up enough decoys in your environment to effectively dupe attackers. But today, technologies like Threatwise<\/a> can easily scale and deploy dozens or hundreds of decoys from a single system, increasing your odds of detecting the threat actor.<\/p>

Add to that Threatwise Advisor, our intelligent assistant that takes into account the data you have in your environment and automatically recommends where and how many decoys you should place across your infrastructure. This makes it simple to deploy and manage, requiring far less maintenance than traditional deception technologies.<\/p>

Strategically deploying decoys and traps near your most critical data improves your security posture. Using a system that already understands your data and its criticality allows for intelligent recommendations for placement that will yield the best results.<\/p>

Get deep insight into an attacker’s tactics, techniques, and procedures<\/strong><\/h3>

An added benefit to using Threatwise deception technologies and decoys to detect threats is that you also can use decoys as ways to gather threat intelligence into how an attacker operates.<\/p>

You can trick attackers into thinking they’ve gained access by deploying real but innocuous decoy assets, complete with things like login screens and more. This allows you to monitor their behavior and gather valuable intel, like credentials they use or test. Early visibility helps you identify and respond to threats much faster, potentially before any damage is done.<\/p>

Deploying deception technology as part of your proactive defensive measures yields better security. The technology can be tailored to reflect your organization’s specific architecture, infrastructure, and risks. It also can be deployed across a wide range of environments, including areas that traditional security tools might miss. This helps to eliminate blind spots in your defenses.<\/p>

If you’d like to learn more about cyber deception, reach out to our sales team and we’d be glad to show you how it works, or start your own trial today<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"

Early threat detection is key to kicking out intruders.<\/p>\n","protected":false},"author":171,"featured_media":521379,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_custom_css":"","_custom_js_footer":"","_page_background_color":"","_remove_from_search":false,"_dark_mode":false,"_light_footer_mode":false,"_sidebar_form":{"id":"","name":"","cta":"","redirect":""},"_alert_notification_bar":{"show":true,"bg_color":"","content":"","call_to_action_label":"","call_to_action_link":""},"_footer_cta":{"show":false,"title":"","subtitle":"","cta_text":"","cta_link":"","background":{"id":0,"url":""}},"_cmv_customer_logo":{"id":0,"url":""},"_jetpack_memberships_contains_paid_content":false,"i18n_hreflangs":"","footnotes":""},"categories":[1463,979,1],"tags":[],"cmv_author":[1551],"class_list":{"0":"post-521378","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-data-protection","8":"category-data-security","9":"category-uncategorized","10":"cmv_author-sam-curcuruto","11":"entry"},"yoast_head":"\nAttackers Overstay Their Welcome | Blog<\/title>\n<meta name=\"description\" content=\"The average dwell time \u2013 an attacker\u2019s time in your environment before detection or executing their attack \u2013 is 204 days. For nearly seven months, attackers move around stealthily, discovering valuable data, understanding your infrastructure and backup environments, and planting back doors that give them persistent access to your organization even if you find and block them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.commvault.com\/blogs\/attackers-overstay-their-welcome\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Attackers Overstay Their Welcome\" \/>\n<meta property=\"og:description\" content=\"The average dwell time \u2013 an attacker\u2019s time in your environment before detection or executing their attack \u2013 is 204 days. For nearly seven months, attackers move around stealthily, discovering valuable data, understanding your infrastructure and backup environments, and planting back doors that give them persistent access to your organization even if you find and block them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.commvault.com\/blogs\/attackers-overstay-their-welcome\" \/>\n<meta property=\"og:site_name\" content=\"Commvault - English - United States\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Commvault\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-15T13:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-12T18:34:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/07\/Security-2-blog.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"unguyen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@commvault\" \/>\n<meta name=\"twitter:site\" content=\"@commvault\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"unguyen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Attackers Overstay Their Welcome | Blog","description":"The average dwell time \u2013 an attacker\u2019s time in your environment before detection or executing their attack \u2013 is 204 days. For nearly seven months, attackers move around stealthily, discovering valuable data, understanding your infrastructure and backup environments, and planting back doors that give them persistent access to your organization even if you find and block them.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.commvault.com\/blogs\/attackers-overstay-their-welcome","og_locale":"en_US","og_type":"article","og_title":"Attackers Overstay Their Welcome","og_description":"The average dwell time \u2013 an attacker\u2019s time in your environment before detection or executing their attack \u2013 is 204 days. For nearly seven months, attackers move around stealthily, discovering valuable data, understanding your infrastructure and backup environments, and planting back doors that give them persistent access to your organization even if you find and block them.","og_url":"https:\/\/www.commvault.com\/blogs\/attackers-overstay-their-welcome","og_site_name":"Commvault - English - United States","article_publisher":"https:\/\/www.facebook.com\/Commvault\/","article_published_time":"2024-07-15T13:00:00+00:00","article_modified_time":"2024-07-12T18:34:22+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/07\/Security-2-blog.png","type":"image\/png"}],"author":"unguyen","twitter_card":"summary_large_image","twitter_creator":"@commvault","twitter_site":"@commvault","twitter_misc":{"Written by":"unguyen","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.commvault.com\/blogs\/attackers-overstay-their-welcome#article","isPartOf":{"@id":"https:\/\/www.commvault.com\/blogs\/attackers-overstay-their-welcome"},"author":{"name":"unguyen","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/person\/dba72b5a781f4b5fd095bc52380eb45c"},"headline":"Attackers Overstay Their Welcome","datePublished":"2024-07-15T13:00:00+00:00","dateModified":"2024-07-12T18:34:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.commvault.com\/blogs\/attackers-overstay-their-welcome"},"wordCount":830,"publisher":{"@id":"https:\/\/commvault-new.go-vip.net\/#organization"},"image":{"@id":"https:\/\/www.commvault.com\/blogs\/attackers-overstay-their-welcome#primaryimage"},"thumbnailUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/07\/Security-2-blog.png","articleSection":["Data Protection","Data Security","uncategorized"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.commvault.com\/blogs\/attackers-overstay-their-welcome","url":"https:\/\/www.commvault.com\/blogs\/attackers-overstay-their-welcome","name":"Attackers Overstay Their Welcome | Blog","isPartOf":{"@id":"https:\/\/commvault-new.go-vip.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.commvault.com\/blogs\/attackers-overstay-their-welcome#primaryimage"},"image":{"@id":"https:\/\/www.commvault.com\/blogs\/attackers-overstay-their-welcome#primaryimage"},"thumbnailUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/07\/Security-2-blog.png","datePublished":"2024-07-15T13:00:00+00:00","dateModified":"2024-07-12T18:34:22+00:00","description":"The average dwell time \u2013 an attacker\u2019s time in your environment before detection or executing their attack \u2013 is 204 days. For nearly seven months, attackers move around stealthily, discovering valuable data, understanding your infrastructure and backup environments, and planting back doors that give them persistent access to your organization even if you find and block them.","breadcrumb":{"@id":"https:\/\/www.commvault.com\/blogs\/attackers-overstay-their-welcome#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.commvault.com\/blogs\/attackers-overstay-their-welcome"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.commvault.com\/blogs\/attackers-overstay-their-welcome#primaryimage","url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/07\/Security-2-blog.png","contentUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/07\/Security-2-blog.png","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/www.commvault.com\/blogs\/attackers-overstay-their-welcome#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.commvault.com\/"},{"@type":"ListItem","position":2,"name":"Attackers Overstay Their Welcome"}]},{"@type":"WebSite","@id":"https:\/\/commvault-new.go-vip.net\/#website","url":"https:\/\/commvault-new.go-vip.net\/","name":"Commvault - English - United States","description":"","publisher":{"@id":"https:\/\/commvault-new.go-vip.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/commvault-new.go-vip.net\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/commvault-new.go-vip.net\/#organization","name":"Commvault","url":"https:\/\/commvault-new.go-vip.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/logo\/image\/","url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80","contentUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80","width":1200,"height":628,"caption":"Commvault"},"image":{"@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Commvault\/","https:\/\/x.com\/commvault","https:\/\/www.instagram.com\/commvault\/","https:\/\/www.linkedin.com\/company\/commvault","https:\/\/www.youtube.com\/user\/commvault","https:\/\/en.wikipedia.org\/wiki\/Commvault"]},{"@type":"Person","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/person\/dba72b5a781f4b5fd095bc52380eb45c","name":"unguyen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/564707f567262bb740287c608ef955e5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/564707f567262bb740287c608ef955e5?s=96&d=mm&r=g","caption":"unguyen"}}]}},"jetpack_featured_media_url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/07\/Security-2-blog.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/posts\/521378","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/users\/171"}],"replies":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/comments?post=521378"}],"version-history":[{"count":1,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/posts\/521378\/revisions"}],"predecessor-version":[{"id":521380,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/posts\/521378\/revisions\/521380"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/media\/521379"}],"wp:attachment":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/media?parent=521378"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/categories?post=521378"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/tags?post=521378"},{"taxonomy":"cmv_author","embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/cmv_author?post=521378"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}