Security frameworks have been developed by government and security organisations to help companies and governments alike develop a baseline of minimum cybersecurity practices. In this webinar we will explore the Mitre Att&ck framework, as well as Essential8 from Australia and CCoP from Singapore to understand how Semperis technologies map to…
Is your cybersecurity strategy ready for today’s attackers? From finding ways past MFA to hiding from SIEM solutions and security logs, threat actors have become adept at bypassing endpoint and traditional defenses. A layered approach to identity threat detection and response (ITDR) can help you defend your hybrid Active Directory…
With access to Active Directory, Azure AD (now Entra ID), and Okta threat actors can gain dominance over your entire infrastructure. Unleash Purple Knight—a free AD, Azure AD, and Okta security assessment tool built by identity security experts—to close security gaps that leave your hybrid AD environment open to cyberattackers.…
Cybercrime does in fact pay, but don’t let it cost you. This webinar will look back at the last year of cyber-attacks in the UK and discuss the costs from both a business and monetary perspective - Lose Active Directory, Lose Your Business! Presented by David Hitchen - Semperis Sr…
Identity Threat Detection and Response (ITDR) is one of the most talked-about security trends this year. Why? Because your identity systems—Active Directory (AD) and Azure AD for most organizations—are a Tier 0 asset that hold the keys to all your IT and business operations. That makes AD a juicy target…
Active Directory has countless paths adversaries can take to achieve domain dominance. The problem is clear—excessive permissions. But sifting through every group and user relationship is impossible. Forest Druid flips the script, taking an inside-out approach to attack path management. Forest Druid focuses on attack paths leading into the Tier…
Real Field Story: Kevin Dreyer, IT Director and CSO, Maple Reinders Kevin Dreyer of Maple Reinders shares how his team used Purple Knight to uncover AD vulnerabilities and develop practices that improved overall security posture. Hear more how this award-winning construction company uses Purple Knight to build up security for…
Real Field Story: John Hallenberger, Systems Administrator and Project Leader, Fox C-6 school district As a K-12 environment, their AD infrastructure is parent/child with about 2,200 staff and 12,000 students. Students are frequently added and removed regularly as they withdraw from the district, including staff to some extent and substitute…
Real Field Story: Patrick Emerick, Senior Systems Engineer, Washington State School District Patrick Emerick wanted to understand better what security challenges he faced in their Active Directory. Purple Knight was exactly what he was looking for. It was easy to use, easy to run, and easy to digest. It gave…
Real Field Story: Jim Shakespear, Southern Utah University Jim Shakespear, Director of IT Security at Southern Utah University (SUU), talks with Petri IT Knowledgebase about AD security and his experience using Purple Knight. Jim has been managing the AD infrastructure at SUU for quite a few years. The bulk of…