Active Directory Backup & Recovery

Forrester TEI of Semperis: Organizations Reduce AD Forest Recovery Time by 90% with ADFR

Forrester TEI of Semperis: Organizations Reduce AD Forest Recovery Time by 90% with ADFR

  • Sean Deuby | Principal Technologist
  • Jun 06, 2024

Successfully recovering from an attack on Active Directory is a race against the clock. Organizations that have been through this worst-case scenario know that being able to recover your AD is just the start: The time to recover AD is a significant factor in the extent of the damage, a…

Best Practices for Active Directory Backup

Best Practices for Active Directory Backup

  • Sean Deuby | Principal Technologist
  • May 23, 2024

Maintaining business continuity during and after a cyberattack has become a chief strategic objective, not just for enterprise cybersecurity, but for IT and business leadership as well. Effective Identity Threat Detection & Response (ITDR), including a documented Active Directory backup and recovery plan, is crucial to strong operational resilience. Identity…

New Forrester TEI Report: Semperis Slashes Downtime by 90%, Saving Customers Millions

New Forrester TEI Report: Semperis Slashes Downtime by 90%, Saving Customers Millions

  • Sean Deuby | Principal Technologist
  • May 20, 2024

How long could your organization go without access to applications and services because of an identity-related cyberattack? That’s the question we often ask security and IT ops leaders when we’re discussing the importance of protecting Active Directory and Entra ID from threat actors. The question seems hypothetical because it assumes…

Active Directory Attacks: Why Cyber Threats Target AD

Active Directory Attacks: Why Cyber Threats Target AD

  • Darren Mar-Elia | VP of Products
  • Feb 21, 2024

[Updated February 21, 2024; originally published December 14, 2017] Active Directory is the most critical identity system for most enterprises. The problem is that in the two-plus decades since Active Directory was released, the enterprise security landscape has changed drastically. This has left many organizations vulnerable to Active Directory attacks.…

A Swift Ransomware Response is the Path to Business Resiliency

A Swift Ransomware Response is the Path to Business Resiliency

  • Mickey Bresman

Cyberattacks on business systems—including hybrid identity systems—continue to make headlines, including recent breaches targeting healthcare company Henry Schein and hospitality conglomerate MGM Resorts. Apart from these well-publicized attacks, the Semperis Breach Preparedness & Response Services team has seen a spike in requests from our customers (and our partners’ customers) to…

How Can K-12 Schools Defend Against Ransomware?

How Can K-12 Schools Defend Against Ransomware?

  • Jared Vichengrad

The cybersecurity challenges in the government and education space are nothing new. Such challenges soared with COVID and continue today. Unfortunately, the cyber defense of mission-critical government and education services has not always kept pace, so we still see risk from several common vulnerabilities—especially for K-12 education organizations. But with…

5 Essential ITDR Steps CISOs Must Know

5 Essential ITDR Steps CISOs Must Know

  • Semperis Team

Just as the impact of cyberattacks is not confined to the IT department, the role of the CISO has expanded beyond the security team. With organizations and analysts now acknowledging that identity is the new security perimeter, overseeing a comprehensive identity-first security strategy has become an essential CISO responsibility. What…

How to Build a Strong ITDR Strategy

How to Build a Strong ITDR Strategy

  • Sean Deuby | Principal Technologist

How do you begin to build a strong Identity Threat Detection and Response (ITDR) strategy? It begins with an understanding of your unique identity environment, says Maarten Goet, Director for Cybersecurity at Wortell and an expert in Microsoft technologies and communities. “The top identity security concern is [organizations] typically don’t…