• Categories

  • Format

Defending Against Credential-Based Attacks – Protecting the Keys to the Front Door

To protect against credential-based attacks, organizations have implemented solutions such as Multifactor Authentication or Privileged Access Management that seek to curtail unauthorized access. However, these solutions still have gaps that an organization can bridge with Deception Technology.

Leveraging MITRE ATT&CK and Shield to Protect Active Directory

Understanding how attackers compromise AD can aid organizations in defending against them. The following analysis uses the MITRE ATT&CK and Shield matrices to identify adversary tactics, techniques, and procedures (TTPs) that target AD and the steps organizations can take to mitigate them.

eWeek: How ADAssessor Brings Visibility to AD Attack Surfaces

Evaluation and commentary by Frank J. Ohlhorst, award-winning technology journalist and IT industry analyst.

ADSecure | Una nueva forma de defender el Directorio Activo

Conozca más sobre la importancia de defender el AD de los atacantes avanzados y operadores de ransomware mediante la defensa activa y la innovación de Attivo Networks.

CyberHub Engage Tech Corner Series – Securing Active Directory

Carolyn Crandall joins the show to talk about how Active Directory has long been ignored and needs the attention of the security professional especially with the recent cybersecurity events that’s taken place. Our adversaries target Active Directory and with the move to Azure Active Directory we have created voids that create greater challenges for practitioners. Carolyn shares best practices and tips.

Ray Kafity, VP of Attivo Networks on ADAssessor for Active Directory Security

Over 90% of all Global Fortune 1000 organizations use AD to control access and deliver services. The underlying issue is the lack of in-network security, which detects attacker lateral movement and privilege escalation activities. Ray Kafity, VP of Attivo Networks, shares the ‘why’ and ‘how’ on protecting Active Directory

Disrupting Lateral Movement by Securing Active Directory

A common tactic among advanced threat actors and ransomware attacks today involves leveraging Active Director to move laterally and accomplish their mission. Active Directory data can give attackers credentials, privileges, access, and persistence. Protecting it must be a high priority for any organization.

Active Directory Exploitation and Defenses for 2021 and Beyond

The issues regarding privilege escalation and lateral movement detection were a highlight of the SolarWinds Congressional hearings and in the news of many recent cyber heists. Compromising Active Directory has been a common element in all of these incidents and should be commanding every CISO’s attention.

Protecting Active Directory Without Privileged Access

Watch this webinar to hear Steve Hunt, a senior cybersecurity analyst at Aite Group, outline why attackers have been successful, decisions that have created weaknesses, and why common security efforts have been insufficient in preventing attacks using advanced techniques.

ADAssessor for Continuous Visibility to Active Directory Exposures & Live Attacks

The ADAssessor solution is a standalone offering that provides continuous visibility to AD exposures vulnerable to attack and detects advanced Active Directory attacks in real-time.

Active Directory Protection Checklist

Many solutions exist that can secure the AD infrastructure, but identifying the right solution that meets the risk profile for a particular organization can be challenging. Use this checklist to evaluate current AD security procedures to identify risks and gaps. Compare them against solution capabilities to address specific requirements.

Reduce Active Directory Exposures and Detect Live AD Attacks

Attivo Networks Active Directory Protection solutions provide continuous visibility, concealment, and misdirection for AD exposures and attacks in near-real-time. The solutions function together to detect and derail domain, device, and user-level vulnerabilities and attacks without requiring excess permissions or installation on the AD controllers.

SolarWinds Breach – Supply Chain ThreatDefend® Attack Detection

As organizations continue to embrace third-party vendors for software and applications, they expose themselves to potential risks in their supply chain. New types of attacks increase the risks associated with a supply chain attack considerably. Attackers have more resources and tools at their disposal than ever before, creating a perfect storm.

Active Directory Protection Animated Video

Active Directory, which is used to authenticate and authorize services, is notoriously difficult to protect. Virtually every employee needs some level of access to its data and, all too frequently, it is either misconfigured or overprovisioned, making it a prime attacker target.

Security Weekly: The Adversary Playbook – How Deception Thwarts Attackers

In this technical training, Tony Cole, CTO at Attivo Networks, and Paul Asadoorian, Chief Innovation Officer at CyberRisk Alliance, will go into the details of the adversary playbook. How do attacks start and propagate? What deception techniques actually work to thwart these attacks?

In-Security Update: ADSecure

Tune in with Carolyn Crandall, CMO and Chief Deception Officer and Tony Cole, CTO as they discuss the state of Active Directory protection and how to leverage the Attivo Networks ADSecure solution to gain visibility to AD attacks, privilege escalation attempts, and attacker lateral movement – all without altering or interfering with production Domain Controllers.

Adversaries in the Wire – Stopping In-Network Threats

Watch this on-demand session to learn how Deception Technology Detects credential theft and unauthorized AD queries, Disrupts host fingerprinting and service discovery, Deflects lateral movement activity, and Detects and alerts on attackers early in the attack cycle.

ADSecure Datasheet

Read on for how the ADSecure solution, that is part of the Attivo Networks ThreatDefend™ Detection Platform, is providing a new approach to preventing cyber criminals for successfully reaching and compromising AD.

Financial Services Firm Deploys ADSecure During Red Team Evaluation

 A commercial bank with over $100 billion in total assets. 

Real Estate Investment Firm Tests ADSecure

 A major US-based real estate investment company with over 200 properties. 

Active Directory Solution – ADSecure Infographic

With the ADSecure solution organizations improve Active Directory security without touching the production AD environment.

Webinar: A New Way to Minimize Active Directory Security Risk

Hear from Chris Roberts, Chief Security Strategist of Attivo Networks, and host Sarah Ashburn, SVP of Sales and Customer Success at Attivo Networks, to hear about the company’s new ADSecure solution, which is designed to improve security to Active Directory (AD) and reduce risk. All, without interfering with the AD production environment.


Defending Against Credential-Based Attacks – Protecting the Keys to the Front Door

To protect against credential-based attacks, organizations have implemented solutions such as Multifactor Authentication or Privileged Access Management that seek to curtail unauthorized access. However, these solutions still have gaps that an organization can bridge with Deception Technology.

Leveraging MITRE ATT&CK and Shield to Protect Active Directory

Understanding how attackers compromise AD can aid organizations in defending against them. The following analysis uses the MITRE ATT&CK and Shield matrices to identify adversary tactics, techniques, and procedures (TTPs) that target AD and the steps organizations can take to mitigate them.

eWeek: How ADAssessor Brings Visibility to AD Attack Surfaces

Evaluation and commentary by Frank J. Ohlhorst, award-winning technology journalist and IT industry analyst.

ADSecure | Una nueva forma de defender el Directorio Activo

Conozca más sobre la importancia de defender el AD de los atacantes avanzados y operadores de ransomware mediante la defensa activa y la innovación de Attivo Networks.

CyberHub Engage Tech Corner Series – Securing Active Directory

Carolyn Crandall joins the show to talk about how Active Directory has long been ignored and needs the attention of the security professional especially with the recent cybersecurity events that’s taken place. Our adversaries target Active Directory and with the move to Azure Active Directory we have created voids that create greater challenges for practitioners. Carolyn shares best practices and tips.

Ray Kafity, VP of Attivo Networks on ADAssessor for Active Directory Security

Over 90% of all Global Fortune 1000 organizations use AD to control access and deliver services. The underlying issue is the lack of in-network security, which detects attacker lateral movement and privilege escalation activities. Ray Kafity, VP of Attivo Networks, shares the ‘why’ and ‘how’ on protecting Active Directory

Disrupting Lateral Movement by Securing Active Directory

A common tactic among advanced threat actors and ransomware attacks today involves leveraging Active Director to move laterally and accomplish their mission. Active Directory data can give attackers credentials, privileges, access, and persistence. Protecting it must be a high priority for any organization.

Active Directory Exploitation and Defenses for 2021 and Beyond

The issues regarding privilege escalation and lateral movement detection were a highlight of the SolarWinds Congressional hearings and in the news of many recent cyber heists. Compromising Active Directory has been a common element in all of these incidents and should be commanding every CISO’s attention.

Protecting Active Directory Without Privileged Access

Watch this webinar to hear Steve Hunt, a senior cybersecurity analyst at Aite Group, outline why attackers have been successful, decisions that have created weaknesses, and why common security efforts have been insufficient in preventing attacks using advanced techniques.

ADAssessor for Continuous Visibility to Active Directory Exposures & Live Attacks

The ADAssessor solution is a standalone offering that provides continuous visibility to AD exposures vulnerable to attack and detects advanced Active Directory attacks in real-time.

Active Directory Protection Checklist

Many solutions exist that can secure the AD infrastructure, but identifying the right solution that meets the risk profile for a particular organization can be challenging. Use this checklist to evaluate current AD security procedures to identify risks and gaps. Compare them against solution capabilities to address specific requirements.

Reduce Active Directory Exposures and Detect Live AD Attacks

Attivo Networks Active Directory Protection solutions provide continuous visibility, concealment, and misdirection for AD exposures and attacks in near-real-time. The solutions function together to detect and derail domain, device, and user-level vulnerabilities and attacks without requiring excess permissions or installation on the AD controllers.

SolarWinds Breach – Supply Chain ThreatDefend® Attack Detection

As organizations continue to embrace third-party vendors for software and applications, they expose themselves to potential risks in their supply chain. New types of attacks increase the risks associated with a supply chain attack considerably. Attackers have more resources and tools at their disposal than ever before, creating a perfect storm.

Active Directory Protection Animated Video

Active Directory, which is used to authenticate and authorize services, is notoriously difficult to protect. Virtually every employee needs some level of access to its data and, all too frequently, it is either misconfigured or overprovisioned, making it a prime attacker target.

Security Weekly: The Adversary Playbook – How Deception Thwarts Attackers

In this technical training, Tony Cole, CTO at Attivo Networks, and Paul Asadoorian, Chief Innovation Officer at CyberRisk Alliance, will go into the details of the adversary playbook. How do attacks start and propagate? What deception techniques actually work to thwart these attacks?

In-Security Update: ADSecure

Tune in with Carolyn Crandall, CMO and Chief Deception Officer and Tony Cole, CTO as they discuss the state of Active Directory protection and how to leverage the Attivo Networks ADSecure solution to gain visibility to AD attacks, privilege escalation attempts, and attacker lateral movement – all without altering or interfering with production Domain Controllers.

Adversaries in the Wire – Stopping In-Network Threats

Watch this on-demand session to learn how Deception Technology Detects credential theft and unauthorized AD queries, Disrupts host fingerprinting and service discovery, Deflects lateral movement activity, and Detects and alerts on attackers early in the attack cycle.

ADSecure Datasheet

Read on for how the ADSecure solution, that is part of the Attivo Networks ThreatDefend™ Detection Platform, is providing a new approach to preventing cyber criminals for successfully reaching and compromising AD.

Financial Services Firm Deploys ADSecure During Red Team Evaluation

 A commercial bank with over $100 billion in total assets. 

Real Estate Investment Firm Tests ADSecure

 A major US-based real estate investment company with over 200 properties. 

Active Directory Solution – ADSecure Infographic

With the ADSecure solution organizations improve Active Directory security without touching the production AD environment.

Webinar: A New Way to Minimize Active Directory Security Risk

Hear from Chris Roberts, Chief Security Strategist of Attivo Networks, and host Sarah Ashburn, SVP of Sales and Customer Success at Attivo Networks, to hear about the company’s new ADSecure solution, which is designed to improve security to Active Directory (AD) and reduce risk. All, without interfering with the AD production environment.