Active Directory Blog Terms - Page 7 of 10 - Attivo Networks

Active Directory

Data Connectors

Data Connectors Canada East Virtual Cybersecurity Summit

Data Connectors has invested in a fully immersive virtual event platform, which provides every facet of their in-person conferences that can be facilitated online: Real-time speaking sessions, live keynotes and presenter Q&A Panels Moderated CISO Panel Solutions Showcase with interactive Virtual Exhibit Booths The virtual events have seen audiences two to three times larger than …

Data Connectors Canada East Virtual Cybersecurity Summit Read More »

Protecting Active Directory in the Cloud

Written by: Joseph Salazar, Technical Marketing Engineer – As organizations transform to take advantage of new cloud offerings and remote work increasingly becomes the norm, it is no surprise that many are choosing to host their Active Directory (AD) infrastructure in the cloud. AWS, Azure, and Google Cloud Platform all offer hosting services for AD. These options allow organizations to authenticate remote and on-premises users, using their enterprise infrastructure for federated authentication and authorization. What’s more, cloud-hosted AD makes it easier for organizations to manage single-sign-on authentication and authorization for both enterprise and cloud-based applications.

Data Connectors

Data Connectors Salt Lake City Denver Virtual Cybersecurity Summit

Data Connectors has invested in a fully immersive virtual event platform, which provides every facet of their in-person conferences that can be facilitated online: Real-time speaking sessions, live keynotes and presenter Q&A Panels Moderated CISO Panel Solutions Showcase with interactive Virtual Exhibit Booths The virtual events have seen audiences two to three times larger than …

Data Connectors Salt Lake City Denver Virtual Cybersecurity Summit Read More »

Defending Against Adversaries

Protecting Production AD in Response to the FireEye Breach On-Demand Webinar

Venu Vissamsetty, VP Security Research | Robert Crisp, VP Field Technical Operations | Joe Carson, Sr. Director Prof Services 43 mins The recent release of FireEye tools included several for exploiting Active Directory. Once an attacker is inside the network, AD is often the primary target as it readily enables enumerating privileged accounts and critical …

Protecting Production AD in Response to the FireEye Breach On-Demand Webinar Read More »

Try the Award-Winning ADSecure Solution Free for 90-Days

Try the Award-Winning ADSecure Solution Free for 90-Days Start your 90-day free trial of the Attivo Networks ADSecure award-winning solution, ideal for organizations using Active Directory to authenticate and authorize users and computers in Windows domain networks. We Make it Easy and Simple No changes to Active Directory. Seamlessly integrate with your endpoint provider making …

Try the Award-Winning ADSecure Solution Free for 90-Days Read More »

Protecting Production AD in Response to the FireEye Breach

The recent release of FireEye tools included several for exploiting Active Directory. Once an attacker is inside the network, AD is often the primary target as it readily enables enumerating privileged accounts and critical objects. The Attivo ADSecure solution prevents unauthorized queries from tools like SharpHound, Rubeus, and SharpZeroLogon, thereby intercepting attacker tools and techniques. …

Protecting Production AD in Response to the FireEye Breach Read More »

Microsoft Active Directory as a Prime Target for Ransomware Operators

Written by: Joseph Salazar, Technical Marketing Manager & Juan Carlos Vázquez, Sales Manager -The Active Directory (AD) infrastructure remains critical in so-called “human-operated” ransomware campaigns and post-compromise extortion, which represents a significant threat to businesses and a detection challenge in the short time they have to avoid impact.

Let’s Talk Turkey: Addressing the Most Common Data Breach Causes

Authored by: Carolyn Crandall, Chief Deception Officer, Attivo Networks – It’s turkey time again, and even though Thanksgiving may look a little different this year, some things stay the same. Large gatherings of friends and family may not be in the plans, but hopefully, your dinner table will still be overflowing with stuffing, mashed potatoes, and, of course, turkey (and maybe some tofurkey).

Free 90 day ADSecure Trial

Attivo EDN Solution for Protecting Credentials and Active Directory

Written by: Carolyn Crandall, Chief Deception Officer and CMO – Cybercriminals are growing more advanced, and one of the most successful tactics employed by cybercriminals remains credential theft. Unfortunately, too many organizations are leaving credentials exposed and easy for attackers to find—and once they fall into the hands of attackers, these credentials make it simple to escalate their attack and move freely throughout the network to find the most valuable data.

Disrupt & Prevent Attacker’s Access to Active Directory Webinar

Active Directory (AD) is used by the majority of enterprises to control and orchestrate the IT environment. Many security professionals have the challenge of distinguishing illegitimate queries to AD from legitimate ones, leaving security teams blind to malicious attempts to map AD’s content. Attivo ADSecure protects against AD attacks without interfering with production AD operations, …

Disrupt & Prevent Attacker’s Access to Active Directory Webinar Read More »

Scroll to Top