Real Field Story: Patrick Emerick, Senior Systems Engineer, Washington State School District Patrick Emerick wanted to understand better what security challenges he faced in their Active Directory. Purple Knight was exactly what he was looking for. It was easy to use, easy to run, and easy to digest. It gave…
Real Field Story: Jim Shakespear, Southern Utah University Jim Shakespear, Director of IT Security at Southern Utah University (SUU), talks with Petri IT Knowledgebase about AD security and his experience using Purple Knight. Jim has been managing the AD infrastructure at SUU for quite a few years. The bulk of…
Prime Healthcare is known for saving hospitals. Their top priority is making sure to protect patient information, as well as providing excellent care which directly impacts the community. David Yancey supports Prime Healthcare's mission by keeping the lights on. It is David's job to ensure that all the applications that…
Semperis Customer Spotlight: Paul Ladd, VP of Information Systems & Technology, AMOCO Federal Credit Union Paul discusses the challenges they faced with protecting and backing up their Active Directory during internal risk assessments, and how Semperis was able to quickly back up and restore their system. They emphasize the importance…
Tal Sarid, Semperis Director of Solutions, takes us through a real-life attack story in which a customer’s Active Directory was fully compromised. We used our Active Directory Forest Recovery (ADFR) solution to create a safety net, and ran our assessment tool, Purple Knight, to discover vulnerabilities. Our findings were significant:…
As we continue to follow the fallout from the Colonial Pipeline attack, Active Directory security pro and Semperis Director of Services Sean Deuby shares how your organization can stay ahead of RaaS attacks that exploit AD. What can you do now to harden your core identity systems against attackers? Request FREE access to…
The DCShadow attack exploits a switch in the Mimikatz utility that enables privileged users to inject malicious changes into Active Directory (AD) without detection. DCShadow takes advantage of native AD replication to avoid sending events to the AD security logs. DCShadow methodology: DCShadow empowers attackers (with admin rights) to spin…