Hybrid Identity Protection

Semperis Recovery for Azure AD: Protecting Critical Resources

Semperis Recovery for Azure AD: Protecting Critical Resources

  • Regina Lapidus
  • May 25, 2023

Today, the cloud has become a highly strategic platform that enables organizations' digital transformation. While the cloud-first approach is still less common, many organizations are embracing a hybrid cloud environment, which allows for maximum flexibility and control. Securing a hybrid identity system, which for most organizations involves on-premises AD synchronized…

Top 15 Steps to a Successful AD Migration

Top 15 Steps to a Successful AD Migration

  • Daniel Petri
  • Apr 18, 2023

Active Directory (AD) migration projects can be challenging and complex. Such projects involve the migration of users, groups, computers, and applications from one AD domain or forest to another. Careful planning and execution can help your migration team complete a successful AD migration, with minimal disruption to end users and…

Why AD Modernization Is Critical to Your Cybersecurity Program

Why AD Modernization Is Critical to Your Cybersecurity Program

  • Mickey Bresman
  • Apr 03, 2023

Active Directory (AD) is the core identity store for many organizations. As such, AD has also become a major target for bad actors. If attackers gain access to AD, they gain access to any resources in the organization. In a hybrid on-prem/cloud scenario, which is common today, that includes access…

5 New Ways to Secure Active Directory and Azure Active Directory

5 New Ways to Secure Active Directory and Azure Active Directory

  • Eitan Bloch
  • Mar 30, 2023

Securing Active Directory (AD)—the common target in 9 out of 10 cyberattacks—is difficult. Many organizations have legacy AD environments with accumulated misconfigurations that attackers love to exploit. And although 90% of organizations worldwide use AD as their primary identity store, Gartner research shows that only 33% have any sort of…

AD Security 101: AD Monitoring for Malicious Changes

AD Security 101: AD Monitoring for Malicious Changes

  • Daniel Petri
  • Mar 09, 2023

Welcome to AD Security 101. This blog series covers essential aspects of Active Directory (AD) security, offering basic concepts, best practices, and expert advice. I’ll start with a short discussion of why AD security is so important. Then I’ll dive into the series with one of the first steps you…

How to Evaluate Identity Threat Detection & Response (ITDR) Solutions

How to Evaluate Identity Threat Detection & Response (ITDR) Solutions

  • Semperis Team
  • Feb 22, 2023

As identity-based cyber threats increase, organizations are expanding their budgets to combat attacks by focusing on Identity Threat Detection and Response (ITDR) solutions—the hot topic in identity-related security. If you’re looking for ITDR solutions to protect Active Directory (the most common identity system), this guide is for you. Here we’ll…

3 Steps to Protect AD from Wiperware

3 Steps to Protect AD from Wiperware

  • Darren Mar-Elia
  • Feb 10, 2023

We’re barely a month into the new year, but wiperware is back in the news. DevPro Journal notes a “drastic increase” starting last year, likely driven by geopolitical conflict. What is wiperware—and how can you protect your organization? What is wiperware? Wiperware is often used as part of an advanced…

How Can K-12 Schools Defend Against Ransomware?

How Can K-12 Schools Defend Against Ransomware?

  • Jared Vichengrad
  • Feb 02, 2023

The cybersecurity challenges in the government and education space are nothing new. Such challenges soared with COVID and continue today. Unfortunately, the cyber defense of mission-critical government and education services has not always kept pace, so we still see risk from several common vulnerabilities—especially for K-12 education organizations. But with…