AD Blog Terms - Attivo Networks

AD

Organizations Aren’t Doing Enough to Secure Active Directory

Written by: Marc Feghali, VP of Product Management – Microsoft launched Active Directory (AD) in the late 90s, and it quickly became the standard in the identity management market. For any company, AD is the crown jewels of its IT infrastructure, as inside AD resides a complete list of all the users, machines, logical grouping, and privileges. This confluence of information is compelling, and it enables modern operations and user experiences at work, in transit, or at their home offices. Also, other programs leverage AD to determine access and level of privilege to the users.

Attivo Networks

Attivo Networks Tightens Detection Net on Attacker Lateral Movement

Company’s Innovations in Deception Technology Lock Down Endpoints, So Attackers Can’t Advance Fremont, CA, July 30, 2019 – Attivo Networks®, the award-winning leader in deception for cybersecurity threat detection, today announced significant portfolio enhancements that effectively lock down the endpoint so that attackers cannot advance their attacks. These innovations include securing Active Directory and the ability to turn every endpoint into a network decoy.

Scroll to Top