Attivo Networks Blogs

Why ID Security Is Important

tahawul tech logo

Ray Kafity, Vice President of META, Attivo Networks

Why ID security is crucial in a time of constant cyber threat and how to battle the threats 

Microsoft estimates that attackers target over 95 million Active Directory (AD) accounts every day, and unfortunately, this number is on the rise. Additionally, with the boost of hybrid work, organisations face the problem of tackling the increased instances of cyber-attacks as an after-effect. Identity-based attacks have become a primary tactic for many attackers. By stealing identities from within the organisation, attackers get access and move laterally throughout the network and cloud environments by impersonating authorised users. Active Directory provides a directory service that allows administrators to manage privileges and control access to resources throughout the organisation’s network, making it an integral part of its day-to-day operations. AD manages privileges and authentication, so the user base must be able to access it easily. Active Directory represents a key that can unlock ID and the rest of the network for an attacker. Therefore, having solid and secure ID security is essential for protecting the organisation against malicious attacks.

Why traditional Identity Solutions is not enough to withstand the modern attacker

Unfortunately, traditional identity solutions still allow room for potential attacks. Many conventional tools ensure that the right users have appropriate access and apply continuous validation, which is the basic principle of the zero-trust security model. However, identity and access management, which focuses solely on providing, connecting, and controlling identity access, is just the beginning of identity security. Protection needs to go beyond initial authentication and access control to include other aspects of identity, from visibility to exposure to attack detection, such as credentials, privileges, and the systems that manage them. Many attackers have discovered that AD is an evident but often ignored asset. When AD vulnerabilities combine with cloud misconfiguration trends, the need for additional layers of protection beyond deployment and access control becomes much clearer. The latest innovative Identity Exposure Visibility solutions provide essential insights into endpoint-stored credentials, Active Directory (AD) misconfigurations, and cloud entitlement overprovisioning. Identity Detection and Response (IDR) solutions are a relatively new category of technology that goes beyond traditional identity access management to detect and respond to identity-based attacks. It works in conjunction with Endpoint Detection and Response (EDR), Extended Detection and Response (XDR), Network Detection and Response (NDR), and other similar solutions.

Why every organisation must update their Identity Security and how they best can do it

With the rise of identity-based attacks, organisations today must detect attackers exploiting, misusing, or stealing corporate identities. And especially with the expanding hybrid workforce, organisations must step up their cyber security to ensure that their security stays top level. This need is especially true as organisations race to adopt the public cloud, and human and non-human identities continue to grow exponentially. It is vital to detect identity-based activity with modern IDR solutions, as attackers exploit credentials, leverage Active Directory (AD), and attack identity through cloud entitlements.

Read the original article by Daniel Shepherd on Tahawultech.

Share on:

Free Active Directory Assessment

Get Visibility Into Privilege And Service Account Exposure

For a limited time, Attivo Networks is providing free Active Directory Security Assessments to demonstrate how ADAssessor provides unprecedented and continuous visibility to AD vulnerabilities.

Try Our Endpoint Detection Net (EDN) for Free


Free use offer of our Award-winning security solution to prevent attackers from lateral movement, credential theft, and privilege escalation, fast and easy.

Newsletter Signup

    Yes, please opt me in to receive your quarterly newsletter, event invitations, and product updates.

    I understand that I can opt out at any time, and can refer to Attivo Networks Privacy Policy for more information.
  • This field is for validation purposes and should be left unchanged.

ADSecure 90-Day Free Trial


  • Hide and deny access to AD objects
  • Get alerted on unauthorized queries
  • Attack details easily viewable in dashboard
  • Your data remains on-premise


Leave a Comment

Your email address will not be published.

thirteen + two =

Ready to find out what’s lurking in your network?

Scroll to Top