Cyberattacks and data breaches are simply too common, with nearly 4,000 confirmed data breaches reported in the latest 2020 Verizon Data Breach Investigations Report. Recent news demonstrates Active Directory (AD) is under heavy attack from adversaries of all types, including nation-state sponsored and organized cybercriminal groups alike.
June 17, 2020 – North Korea’s state hackers caught engaging in BEC scams
June 21, 2020 – Ransomware operators lurk on your network after their attack
July 7, 2020 – Ransomware + Exfiltration + Leaks = Data Breach
In each of these recent breaches, Active Directory was noted as a key attack component. Now more than ever, organizations need to protect themselves, their customers, and their data…and it starts with Active Directory.
In the latest release of StealthDEFEND®, we have added new and enhanced AD attack detections to our comprehensive library of detectable attacks.
Knowing what to look for, the Tactics, Techniques, and Procedures (TTPs) bad actors use during attacks is critical to identifying and halting progress early. Again, in this release, we’re going beyond simply alerting your security pros when we detect an attack, offering threat response playbooks that auto-trigger when a threat is detected. Both knowing what to look for and responding immediately with the proper corrective or containment actions are critical for reducing dwell time during a breach.
Rod Simmons – VP of Active Directory Product Strategy
“Reducing the dwell time of attackers has everything to do with accelerating detection of, and response to, cyber threats.”, said Rod Simmons, VP, Product Strategy at Stealthbits. “The new and enhanced attack detection in this release strengthens an already extensive library of attacks we are tuned to detect. The ability to auto-respond the instant attacks are detected vastly improves any organization’s ability to contain and eradicate threats quickly and with confidence.”
Additionally, in the newest release of StealthINTERCEPT®, Stealthbits has provided new tools to remove the signal-to-noise ratio within important datasets like Active Directory LDAP activity and AD ‘Read Event’ auditing, allowing security practitioners to more easily pinpoint attack behaviors. We have also added the ability to detect when Flexible Single Master Operation (FSMO) roles are relocated or taken by a new system.
Lastly in the newest release of Stealthbits Activity Monitor, we expand visibility into Azure Active Directory with the ability to monitor and investigate over 800 events.
Organizations seeking ways to make substantial improvements in their ability to mitigate, detect, and even prevent advanced threats targeted at Active Directory or any of the resources Active Directory has been connected to are invited to evaluate Stealthbits’ offerings in full. We help organizations from Fortune 100’s to SMBs get a better handle on and the security of the backbone of authentication and authorization within their hybrid environments.
StealthDEFEND 2.5, StealthINTERCEPT 7.1, and Stealthbits Activity Monitor 5.0 are available immediately. To learn more, register for our upcoming webinar:
To arrange a private demonstration or for more information, visit https://www.stealthbits.com/contact.
Damon is the Director of Product Marketing at Stealthbits responsible for Active Directory and Privileged Access Management solutions. He has over 20 years of experience addressing marketing challenges of all kinds for many notable, B2B software companies, including Red Hat, Quest Software, Sterling Commerce, and most recently SecureAuth. Damon has a passion for cybersecurity software and improving the defenses of organizations against cyber-attacks. Damon resides in Columbus, Ohio.
Proper data security begins with a strong foundation. Find out what you're standing on with a free deep-dive into the security of your Structured and Unstructured Data, Active Directory, and Windows infrastructure.Read more
Start a Free Stealthbits Trial!
No risk. No obligation.