Investment in identity security and identity protection has reached an all-time high. This year, the value of the global identity and access management (IAM) market is projected to reach $20.75 billion. This is hardly surprising; Gartner recently estimated that roughly 75% of all security failures are attributable to poor identity,…
A man-in-the-middle attack, also known as an MitM attack, is a form of eavesdropping. These attacks can pose a serious threat to organizations' network security, particularly in environments that use Microsoft Active Directory (AD) for identity management. What is a man-in-the-middle attack? In a man-in-the-middle attack, a malicious actor positions…
Resource-based constrained delegation (RBCD) is an Active Directory (AD) security feature that enables administrators to delegate permissions in order to manage resources more securely and with greater control. Introduced in Windows Server 2012 R2 as an enhancement to the traditional Kerberos constrained delegation (KCD), RBCD can help to reduce the…
Today, the cloud has become a highly strategic platform that enables organizations' digital transformation. While the cloud-first approach is still less common, many organizations are embracing a hybrid cloud environment, which allows for maximum flexibility and control. Securing a hybrid identity system, which for most organizations involves on-premises AD synchronized…
Active Directory (AD) migration projects can be challenging and complex. Such projects involve the migration of users, groups, computers, and applications from one AD domain or forest to another. Careful planning and execution can help your migration team complete a successful AD migration, with minimal disruption to end users and…
Active Directory (AD) is the core identity store for many organizations. As such, AD has also become a major target for bad actors. If attackers gain access to AD, they gain access to any resources in the organization. In a hybrid on-prem/cloud scenario, which is common today, that includes access…
Securing Active Directory (AD)—the common target in 9 out of 10 cyberattacks—is difficult. Many organizations have legacy AD environments with accumulated misconfigurations that attackers love to exploit. And although 90% of organizations worldwide use AD as their primary identity store, Gartner research shows that only 33% have any sort of…
An unmanaged Active Directory (AD) can have a profound impact on your operations, leading to downtime and increasing your vulnerability to network security threats. AD monitoring can provide insights you need to ensure smooth operations, optimize performance, and safeguard your network. Welcome to AD Security 101. This blog series covers…