Active Directory Tag

Data Connectors Southern California Virtual Cybersecurity Summit

Reading Time: < 1 minute  |  Published: March 10, 2021 in
0 Comments

Data Connectors has invested in a fully immersive virtual event platform, which provides every facet of their in-person conferences that can be facilitated online:    Real-time speaking sessions, live keynotes and presenter Q&A Panels    Moderated CISO Panel    Solutions Showcase with interactive Virtual Exhibit Booths The virtual events...

Data Connectors Boston Virtual Cybersecurity Summit

Reading Time: < 1 minute  |  Published: February 25, 2021 in
0 Comments

Data Connectors has invested in a fully immersive virtual event platform, which provides every facet of their in-person conferences that can be facilitated online:    Real-time speaking sessions, live keynotes and presenter Q&A Panels    Moderated CISO Panel    Solutions Showcase with interactive Virtual Exhibit Booths The virtual events...

Data Connectors Boston Virtual Cybersecurity Summit

Reading Time: < 1 minute  |  Published: February 25, 2021 in
0 Comments

Data Connectors has invested in a fully immersive virtual event platform, which provides every facet of their in-person conferences that can be facilitated online:    Real-time speaking sessions, live keynotes and presenter Q&A Panels    Moderated CISO Panel    Solutions Showcase with interactive Virtual Exhibit Booths The virtual events...

Data Connectors Canada East Virtual Cybersecurity Summit

Reading Time: < 1 minute  |  Published: January 20, 2021 in
0 Comments

Data Connectors has invested in a fully immersive virtual event platform, which provides every facet of their in-person conferences that can be facilitated online:    Real-time speaking sessions, live keynotes and presenter Q&A Panels    Moderated CISO Panel    Solutions Showcase with interactive Virtual Exhibit Booths The virtual events...

Protecting Active Directory in the Cloud

Reading Time: 3 minutes  |  Published: January 15, 2021 in Active Directory, Blogs, Cloud
0 Comments

Written by: Joseph Salazar, Technical Marketing Engineer - As organizations transform to take advantage of new cloud offerings and remote work increasingly becomes the norm, it is no surprise that many are choosing to host their Active Directory (AD) infrastructure in the cloud.  AWS, Azure,...

Data Connectors Salt Lake City Denver Virtual Cybersecurity Summit

Reading Time: < 1 minute  |  Published: January 13, 2021 in
0 Comments

Data Connectors has invested in a fully immersive virtual event platform, which provides every facet of their in-person conferences that can be facilitated online:    Real-time speaking sessions, live keynotes and presenter Q&A Panels    Moderated CISO Panel    Solutions Showcase with interactive Virtual Exhibit Booths The virtual events...

Try the Award-Winning ADSecure Solution Free for 90-Days

Reading Time: < 1 minute  |  Published: December 22, 2020 in Active Directory, Attivo (Company), Blogs
0 Comments

Try the Award-Winning ADSecure Solution Free for 90-Days Start your 90-day free trial of the Attivo Networks ADSecure award-winning solution, ideal for organizations using Active Directory to authenticate and authorize users and computers in Windows domain networks. We Make it Easy and Simple No changes to Active...

Protecting Production AD in Response to the FireEye Breach

Reading Time: < 1 minute  |  Published: December 22, 2020 in
0 Comments

The recent release of FireEye tools included several for exploiting Active Directory. Once an attacker is inside the network, AD is often the primary target as it readily enables enumerating privileged accounts and critical objects. The Attivo ADSecure solution prevents unauthorized queries from tools like...

Microsoft Active Directory as a Prime Target for Ransomware Operators

Reading Time: 4 minutes  |  Published: December 9, 2020 in Active Directory, Ransomware
0 Comments

Written by: Joseph Salazar, Technical Marketing Manager & Juan Carlos Vázquez, Sales Manager -The Active Directory (AD) infrastructure remains critical in so-called “human-operated” ransomware campaigns and post-compromise extortion, which represents a significant threat to businesses and a detection challenge in the short time they have...