Attivo Networks ADSecure-DC solution identifies enumeration and attacks
Attivo Networks Blogs

Attivo Networks ADSecure-DC solution identifies enumeration and attacks targeting Active Directory

Help Net Security Logo

Attivo Networks announced it has expanded its Active Directory Protection portfolio with capabilities to efficiently detect identity-based attacks at the domain controller from all endpoints.

The new ADSecure-DC solution provides threat protection from attacks originating from Windows as well as Mac, Linux, IoT/OT devices, and unmanaged devices which are limited in their ability to run traditional endpoint protection software.

In 2021, there was a surge of attacks targeting Active Directory domain controllers in order to gain the privileges that are needed to install backdoors, change security policies, and distribute ransomware or malware. Over 90% of Global 1000 enterprises use Active Directory for authentication and authorization, per Frost & Sullivan.

According to an Enterprise Management Associates (EMA) research report, half of the organizations surveyed experienced an attack on Active Directory (AD), with more than 40% indicating the attack was successful. 86% of respondents indicated that they were planning to prioritize the protection of Active Directory with increased investment.

The Attivo Networks ADSecure-DC solution identifies enumeration and attacks targeting Active Directory. It also detects suspicious user behaviors using deep packet inspection and behavior analytics and delivers high-fidelity alerts. Organizations gain AD security for attacks from managed and unmanaged systems, IoT and OT devices, and popular Windows and non-Windows (Mac, Linux) systems without interfering with domain controller operations.

“Active Directory services continue to be the powerhouse for all critical information and help adversaries to further their attacks easily and without detection,” said Srikant Vissamsetti, SVP of engineering at Attivo Networks. “For organizations that are using a managed Active Directory service, the additional protection of domain controllers prevent attackers from carrying out ransomware, Kerberoasting, Silver Ticket compromise, Domain Replication and other advanced AD attacks.”

“In the cybersecurity world today, Active Directory is one of the most targeted assets by threat actors. By leveraging AD’s vulnerabilities, attackers can penetrate an enterprise’s entire network, and freely move undetected across multiple attack paths,” said by Christopher M. Steffen, CISSP, CISA, Research Director at EMA Research.“However, enterprises today recognize the many risks and vulnerabilities Active Directory faces, making AD protection a top priority in 2022.”

The Attivo Networks ADSecure-DC solution joins the company’s existing suite of Active Directory protection products. These include ADSecure-EP, which operates on the endpoint and prevents attackers from seeing and accessing privileged credentials in Active Directory, ADAssessor for continuous AD exposure visibility, and ThreatPath, which identifies and remediates exposed and risky credentials on the endpoint. Organizations deploying these solutions gain easy, efficient, and effective protection for their AD environment.

Read the original article on Help Net Security.

Share on:

Free Active Directory Assessment

Get Visibility Into Privilege And Service Account Exposure

For a limited time, Attivo Networks is providing free Active Directory Security Assessments to demonstrate how ADAssessor provides unprecedented and continuous visibility to AD vulnerabilities.

Try Our Endpoint Detection Net (EDN) for Free

FAST AND EASY

Free use offer of our Award-winning security solution to prevent attackers from lateral movement, credential theft, and privilege escalation, fast and easy.

ADSecure 90-Day Free Trial

GET PROTECTION AGAINST UNAUTHORIZED ACCESS TO ACTIVE DIRECTORY

  • Hide and deny access to AD objects
  • Get alerted on unauthorized queries
  • Attack details easily viewable in dashboard
  • Your data remains on-premise

RSS

Ready to find out what’s lurking in your network?

Scroll to Top