Hybrid Identity Protection

Semperis Offers New Protection Against Okta Breaches

Semperis Offers New Protection Against Okta Breaches

  • Semperis Research Team
  • Aug 30, 2023

In an ever-evolving digital landscape, organizations rely on robust identity protection solutions to safeguard sensitive data and maintain secure operations. For most enterprise businesses, that means protecting Active Directory and Entra ID (formerly Azure AD). But identity protection is just as vital for organizations that use Okta, a cloud-based identity…

Preparing for the Future of Identity Management

Preparing for the Future of Identity Management

  • Sean Deuby
  • Aug 10, 2023

Investment in identity security and identity protection has reached an all-time high. This year, the value of the global identity and access management (IAM) market is projected to reach $20.75 billion. This is hardly surprising; Gartner recently estimated that roughly 75% of all security failures are attributable to poor identity,…

AD Security 101: Man-in-the-Middle Attacks

AD Security 101: Man-in-the-Middle Attacks

  • Daniel Petri
  • Jul 13, 2023

Man-in-the-middle attacks, also known as MitM attacks, are a form of eavesdropping. These attacks can pose a serious threat to organizations' network security, particularly in environments that use Microsoft Active Directory (AD) for identity management. What is a man-in-the-middle attack? In a man-in-the-middle attack, a malicious actor positions themselves between…

AD Security 101: Resource-Based Constraint Delegation

AD Security 101: Resource-Based Constraint Delegation

  • Daniel Petri
  • Jun 23, 2023

Resource-based constraint delegation (RBCD) is an Active Directory (AD) security feature that enables administrators to delegate permissions in order to manage resources more securely and with greater control. Introduced in Windows Server 2012 R2 as an enhancement to the traditional Kerberos constrained delegation (KCD), RBCD can help to reduce the…

Semperis Recovery for Azure AD: Protecting Critical Resources

Semperis Recovery for Azure AD: Protecting Critical Resources

  • Regina Lapidus
  • May 25, 2023

Today, the cloud has become a highly strategic platform that enables organizations' digital transformation. While the cloud-first approach is still less common, many organizations are embracing a hybrid cloud environment, which allows for maximum flexibility and control. Securing a hybrid identity system, which for most organizations involves on-premises AD synchronized…

Top 15 Steps to a Successful AD Migration

Top 15 Steps to a Successful AD Migration

  • Daniel Petri
  • Apr 18, 2023

Active Directory (AD) migration projects can be challenging and complex. Such projects involve the migration of users, groups, computers, and applications from one AD domain or forest to another. Careful planning and execution can help your migration team complete a successful AD migration, with minimal disruption to end users and…

Why AD Modernization Is Critical to Your Cybersecurity Program

Why AD Modernization Is Critical to Your Cybersecurity Program

  • Mickey Bresman
  • Apr 03, 2023

Active Directory (AD) is the core identity store for many organizations. As such, AD has also become a major target for bad actors. If attackers gain access to AD, they gain access to any resources in the organization. In a hybrid on-prem/cloud scenario, which is common today, that includes access…

5 New Ways to Secure Active Directory and Azure Active Directory

5 New Ways to Secure Active Directory and Azure Active Directory

  • Eitan Bloch
  • Mar 30, 2023

Securing Active Directory (AD)—the common target in 9 out of 10 cyberattacks—is difficult. Many organizations have legacy AD environments with accumulated misconfigurations that attackers love to exploit. And although 90% of organizations worldwide use AD as their primary identity store, Gartner research shows that only 33% have any sort of…