The Silverfort MFA solution represents a fundamentally different approach to identity protection, providing MFA coverage to all enterprise resources – including those previously considered unprotectable – without agents or proxies.

This white paper will demonstrate how you can:

  • Extend MFA protection to ALL enterprise resources – without blind spots!
  • Address a wide array of MFA use cases
  • Integrate with all on-prem and cloud directories by means of a single solution

The Monetary Authority of Singapore has revised its risk management guidelines to reduce the risk of identity-based attacks. Financial institutions will need to comply, and compliance is not a trivial matter.
Silverfort is uniquely positioned to help institutions comply with the Identity Protection aspects of the new MAS guidelines.

This white paper explains how you can:

  • Extend MFA to resources that could never before have been protected – without agents or proxies
  • Provide real-time risk scoring for all authentications and access attempts
  • Enforce both rule-based and adaptive risk-based access policies to ensure that accounts aren’t compromised

Description: 

Insurance companies are now requiring their customers to deploy MFA across all key resources in order to decrease their exposure to ransomware attacks. However, many organizations find these requirements extremely challenging to implement.

Hugh Christiansen, Enterprise Solutions Architect at High Touch Technologies, explains how Silverfort enabled his organization to get over this new hurdle and renew their cyber insurance policy.

Watch this webinar to learn:

  • Why were the new MFA requirements challenging to solve?
  • What made Silverfort the best fit for cyber insurance compliance?
  • How did High Touch Technologies conduct the evaluation and deployment process of Silverfort MFA?

 

MFA protection is ultimately only as strong as its weakest link. Without an MFA deployment that covers all organizational resources, these weak links will persist, potentially exposing your organization to risk.

Download this eBook to learn:

  • What are the security gaps in traditional MFA solutions?
  • How can you assess your existing MFA protection to better understand your risk exposure?
  • How can you gain end-to-end MFA coverage for all your cloud and on-prem resources?

 This eBook will explain:

  • Why propagation is the most critical stage in a ransomware attack
  • What makes this propagation a blind spot for today’s security products
  • How Silverfort’s Unified Identity Protection platform proactively prevents ransomware propagation

 

Silverfort’s Unified Risk Analysis across cloud and hybrid environments detects and prevents identity-based attacks with comprehensive risk analysis and adaptive policies.

Download this brief to understand how Silverfort can help with:

  • End-to-end identity protection with Ping Identity
  • Risk analysis based on the full context of user activity
  • Risk-based authentication and zero trust policies

Download Now

 

Description

Domain Controllers are a core part of your enterprise infrastructure and are thus a target of choice for threat actors. Ensuring that your DCs do not contain vulnerabilities that expose them to compromise is a key part of your resilience to cyberattacks.

Silverfort’s Vulnerability Assessment Tool scans your domain, detects all domain controllers and assesses whether your domain is exposed to critical identity-based vulnerabilities:

  • Zerologon (CVE-2020-1472)
  • Bronze Bit (CVE-2020-17049)
  • Printer Spooler Vulnerabilities (CVE-2021-1675 and CVE-2021-34527 aka PrintNightmare and CVE-2021-34481)
  • LDAP Relay
  • PetitPotam (PSPKI Audit)
  • KDC Spoofing
New call-to-action

Disclaimers and Tool Security

Silverfort’s Vulnerability Assessment Tool uses public methods to scan and identify vulnerabilities remotely. It uses LDAP protocol to detect all domain controllers. Due to its sensitivity, we require the use of LDAPS (Secured) by default. The tool requires Domain Admin privileges to access the domain controllers using WMI to collect information needed to estimate the exposure status. The information collected by the tool is stored locally and is not sent out.

BY DOWNLOADING OR ACCESSING THE VULNERABILITY ASSESSMENT TOOL SOFTWARE (“SOFTWARE”), YOU ACCEPT THE TERMS OF SERVICE IN THIS LINK AND AGREE TO BE BOUND BY THEM. IF YOU DO NOT ACCEPT OR AGREE WITH THESE TERMS OF SERVICE, PLEASE DO NOT DOWNLOAD OR ACCESS THE SOFTWARE.

How to use the tool

  1. Download the Silverfort Vulnerability Assessment Tool.
  2. Run SFDetector.exe from any Windows computer with network access to domain controllers.
  3. If you are not yet logged in as Domain Admin, select “Run as different user” and enter your Domain Admin credentials and Domain Fully Qualified Domain Name (FQDN).
  4. Choose desired vulnerability (all checked by default).
  5. Press Run and wait for the assessment to finish; a CSV output file will be created in the folder you ran the script from with results of the assessment.

If you would like to see this tool assess additional vulnerabilities or provide feedback, please reach out to [email protected]

 

 

Many believe that MFA is needed only for privileged accounts. This misconception can have far-reaching consequences, as recent events have demonstrated that only a full MFA deployment across all organizational assets can block potential attackers.

Download this brief to learn from recent real-life attacks how to:

  • Recognize attacks from those logging in with legitimate yet compromised credentials
  • Discover and monitor anomalous behavior from service accounts
  • Detect lateral movement within a hybrid network

Read Now

 

Watch this short video (with German subtitles) about Unified Identity Protection, the first security solution that is purpose-built to secure modern enterprises against identity-based attacks. This includes unauthorized access to sensitive resources, the spread of malware via lateral movement, and more.

By Hed Kovetz, CEO and Co-Founder at Silverfort.

Silverfort’s Unified Identity Protection platform is uniquely positioned to help agencies and enterprises address three main requirements laid out in the recent US Executive Order on cybersecurity.

Download this brief to understand how Silverfort can help with:

  • Establishing multi-factor, risk-based authentication, and conditional access across the
    enterprise
  • Prioritizing resources for the adoption and use of cloud technology
  • Developing a plan to implement Zero Trust Architecture

Download Now

 

Next Page »