Directory Services Protector

Automating Identity Protection Means Stronger Security Posture for the Town of Whitby

Automating Identity Protection Means Stronger Security Posture for the Town of Whitby

  • Semperis
  • Dec 11, 2025

For a community of 150,000, protecting identity infrastructure—a key target for attackers—required deeper insight into the AD environment’s security and configuration. Semperis DSP provided what no other solution could.

Mind the Gap: How to Secure Active Directory Service Accounts

Mind the Gap: How to Secure Active Directory Service Accounts

  • Semperis
  • Nov 12, 2025

Service accounts are critical for enabling machine-to-machine communication in Active Directory (AD) environments. Email systems, databases, applications, even your security tools—all rely on service accounts for authentication. However, 94% of organizations lack full visibility into their service accounts. Learn how to close service account security gaps and strengthen IAM protection.

The Telecommunications Security Act and Your Identity Infrastructure

The Telecommunications Security Act and Your Identity Infrastructure

  • Semperis
  • Oct 17, 2025

The interdependent nature of telecom’s operational functions makes identity security itself a critical function. Let’s explore the steps for securing identity systems, achieving compliance with the UK’s Telecommunications Security Act, and ensuring operational resilience.

NIST Cybersecurity Framework 2.0 and Your Identity Infrastructure

NIST Cybersecurity Framework 2.0 and Your Identity Infrastructure

  • Semperis
  • Sep 24, 2025

The NIST Cybersecurity Framework has gained international acceptance as a foundational standard, and many of its components are referenced across global cybersecurity standards and regulations. Discover how an identity-first approach empowers NIST CSF conformance—and builds true cyber resilience.

APRA CPS 230 and Your Identity Infrastructure

APRA CPS 230 and Your Identity Infrastructure

  • Semperis
  • Sep 11, 2025

As the cornerstone of operational access, Active Directory enables financial services organizations to manage access to essential data and services. However, AD is also the prime target for cyber attackers. Learn how an identity-first approach to APRA CPS 230 compliance helps organizations ensure resilient financial services.

The UAE Information Assurance Regulation and Your Identity Infrastructure

The UAE Information Assurance Regulation and Your Identity Infrastructure

Quick response and effective recovery from cyber incidents is at the heart of the United Arab Emirates Information Assurance Regulation. Learn why compliance depends on prioritizing Active Directory security, recovery, and resilience.

RIIO-2 and Your Identity Infrastructure

RIIO-2 and Your Identity Infrastructure

In the face of a complex cyber threat landscape, the RIIO-2 Cyber Resilience Guidelines aim to provide the controls UK energy utilities need to establish security resilience for their networks. Learn why identity security is central to compliance with these requirements.

Ensuring Identity Cyber Resilience at American Airlines

Ensuring Identity Cyber Resilience at American Airlines

  • Jul 29, 2025

American Airlines uses Directory Services Protector (DSP) and Active Directory Forest Recovery (ADFR) to help ensure identity security and cyber resilience. In this customer story, Jonathan Elledge, senior IAM engineer at American Airlines, discusses the value of easy and reliable AD forest recovery, automating threat monitoring, and immediate rollback of…

NIS2 and Your Identity Infrastructure

NIS2 and Your Identity Infrastructure

Compliance with the EU’s NIS2 directive requires a focus on securing identity systems, which have become a key battleground for cyber defenders and attackers.

ECC-2 and Your Identity Infrastructure

ECC-2 and Your Identity Infrastructure

Saudi Arabia’s ECC-2 controls provide comprehensive, standards-driven cybersecurity practices for public and private organizations. Much of their guidance applies particularly to identity systems—the source of access and authentication across most critical business systems.