This eBook will explain:

    • Why propagation is the most critical stage in a ransomware attack
    • What makes this propagation a blind spot for today’s security products
    • How Silverfort’s Unified Identity Protection platform proactively prevents ransomware propagation

 

Silverfort’s Unified Risk Analysis across cloud and hybrid environments detects and prevents identity-based attacks with comprehensive risk analysis and adaptive policies.

Download this brief to understand how Silverfort can help with:

  • End-to-end identity protection with Ping Identity
  • Risk analysis based on the full context of user activity
  • Risk-based authentication and zero trust policies

Download Now

 

Description

Domain Controllers are a core part of your enterprise infrastructure and are thus a target of choice for threat actors. Ensuring that your DCs do not contain vulnerabilities that expose them to compromise is a key part of your resilience to cyberattacks.

Silverfort’s Vulnerability Assessment Tool scans your domain, detects all domain controllers and assesses whether your domain is exposed to critical identity-based vulnerabilities:

  • Zerologon (CVE-2020-1472)
  • Kerberos Bronze Bit (CVE-2020-17049)
  • Printer Spooler Vulnerabilities (CVE-2021-1675 and CVE-2021-34527 aka PrintNightmare and CVE-2021-34481)
  • LDAP Relay
  • PetitPotam
New call-to-action

Disclaimers and Tool Security

Silverfort’s Vulnerability Assessment Tool uses public methods to scan and identify vulnerabilities remotely. It uses LDAP protocol to detect all domain controllers. Due to its sensitivity, we require the use of LDAPS (Secured) by default. The tool requires Domain Admin privileges to access the domain controllers using WMI to collect information needed to estimate the exposure status. The information collected by the tool is stored locally and is not sent out.

BY DOWNLOADING OR ACCESSING THE VULNERABILITY ASSESSMENT TOOL SOFTWARE (“SOFTWARE”), YOU ACCEPT THE TERMS OF SERVICE IN THIS LINK AND AGREE TO BE BOUND BY THEM. IF YOU DO NOT ACCEPT OR AGREE WITH THESE TERMS OF SERVICE, PLEASE DO NOT DOWNLOAD OR ACCESS THE SOFTWARE.

How to use the tool

  1. Download Silverfort Vulnerability Assessment Tool.
  2. Run SFDetector.exe from any Windows computer with network access to domain controllers.
  3. Insert Domain Admin credentials and Domain Fully Qualified Domain Name (FQDN).
  4. Choose desired vulnerability (all checked by default).
  5. Press Run and wait for the assessment to finish; a CSV output file will be created in the folder you ran the script from with results of the assessment.

If you would like to see this tool assess additional vulnerabilities or provide feedback, please reach out to [email protected]

 

Many believe that MFA is needed only for privileged accounts. This misconception can have far-reaching consequences, as recent events have demonstrated that only a full MFA deployment across all organizational assets can block potential attackers.

Download this brief to learn from recent real-life attacks how to:

  • Recognize attacks from those logging in with legitimate yet compromised credentials
  • Discover and monitor anomalous behavior from service accounts
  • Detect lateral movement within a hybrid network

Read Now

Watch this short video (with German subtitles) about Unified Identity Protection, the first security solution that is purpose-built to secure modern enterprises against identity-based attacks. This includes unauthorized access to sensitive resources, the spread of malware via lateral movement, and more.

By Hed Kovetz, CEO and Co-Founder at Silverfort.

Silverfort’s Unified Identity Protection platform is uniquely positioned to help agencies and enterprises address three main requirements laid out in the recent US Executive Order on cybersecurity.

Download this brief to understand how Silverfort can help with:

  • Establishing multi-factor, risk-based authentication, and conditional access across the
    enterprise
  • Prioritizing resources for the adoption and use of cloud technology
  • Developing a plan to implement Zero Trust Architecture

Download Now

Description: 

Are you protected against attackers who already have your users’ credentials?

The 15 billion compromised credentials circulating in the dark web are the #1 cause of data breaches. Protection against these identity-based attacks is a blind spot in today’s identity and security stack. A new approach is required to regain the upper hand against account takeovers, malicious remote connections and lateral movement attacks.

Watch the recorded webinar to:

  • Gain insight into identity-based attack types, scale and impact
  • Understand the inherent security gaps that prevent us from being resilient to these attacks
  • Discover Unified Identity Protection – the new paradigm that delivers real-time protection against identity-based attacks

Speaker

Yiftach Keshet, Director Of Product Marketing at Silverfort

Yiftach Keshet leads the Product Marketing at Silverfort. Prior to joining Silverfort he served in various Product Management and Product Marketing roles with cybersecurity market leaders such as Microsoft, Palo Alto Networks and Team8.

Description: 

Did you know that lateral movement attacks leverage compromised credentials to propagate through the network and gain access to target resources?
In this recorded webinar, we explain these attacks, and the use of compromised credentials in various steps the difference between standard and advanced attacks, and why security solutions often fail to detect and prevent these attacks. Finally, we will explain how Silverfort’s cutting edge identity platform can detect and block these attacks.

Topics covered:

  • What are the most common lateral movement attacks
  • The identity and security aspects of lateral movement
  • Why security products often fail to prevent lateral movement
  • How Silverfort’s Unified Identity Protection platform eliminates different types of lateral movement attacks in real time

Speakers

Yiftach Keshet, Director Of Product Marketing at Silverfort

Yiftach Keshet leads the Product Marketing at Silverfort. Prior to joining Silverfort he served in various Product Management and Product Marketing roles with cybersecurity market leaders such as Microsoft, Palo Alto Networks and Team8.

 

 

Gal Sadeh, Chief Data Scientist at Silverfort

Gal is Chief Data Scientist in Silverfort’s research team. He is responsible for big data analytics and developing AI engines. He joined Silverfort after many years of research and leadership roles at the 8200 elite cyber unit of the Israel Defense Forces. Gal holds a Masters in Mathematics and Computer Science from Tel Aviv University.

Description:
Looking to gain unified IAM control, visibility and protection across your hybrid environment? Now you can extend the power and flexibility of Azure AD to any resource and application, across your hybrid and multi-cloud environments, and unify identity protection on Azure AD – without changing your apps and resources. Join Microsoft and Silverfort for a live panel on the benefits of consolidating identity protection for hybrid environments on Azure AD. Azure AD without modifying your apps.

We will show how this capability enables you to:

• Automatically discover and easily migrate applications to Azure AD
• Seamlessly connect any assets that couldn’t be migrated before into Azure AD including homegrown and legacy applications, IT infrastructure, command-line tools, and more
• Manage Identity Protection of all your on-prem and multi-cloud environments in a unified manner within Azure AD
• Gain operational efficiency and protection by applying Azure AD security controls to all resources in your hybrid network

Speakers: 

Silverfort: CEO and CO-Founder, Hed Kovetz and VP Product Management, Ron Rasin

Microsoft: Natee Pretikul, PM, Cloud and AI and Adaeze Chukwu, PM, Identity CXP

Silverfort eBook on Azure AD

 This eBook will explain how to:

  • Automatically discover and easily migrate applications to Azure AD
  • Seamlessly connect any asset that couldn’t be migrated before into Azure AD, including homegrown and legacy applications, IT infrastructure, command-line tools, and more
  • Protect identities across all your on-prem and multi-cloud environments in a unified manner within Azure AD
  • Gain operational efficiency and protection by applying Azure AD security controls to all resources in your hybrid environments
Next Page »