Leading Manufacturer Averted Lateral Movement: A Case Study

Identity Protection: A Top Priority This case study discusses a supply chain cyber incident where a leading manufacturer was attacked by nation-state actors who were attempting to move laterally from a compromised factory network to the manufacturer’s domain environment via laptops that were maliciously accessed while several of the company’s employees were visiting the factory. […]

Agilisys and Silverfort: A Case Study

Extending MFA Protection Across All Environments: Agilisys was looking to ensure sufficient MFA protection for all its environments and interfaces, including those that could not previously have been protected. With Silverfort, they secured all their on-prem resources and legacy apps within a month. In this case study you’ll learn:

ZOL and Silverfort

When ZOL hospital in Belgium needed to protect its service accounts from attack with minimal disruption, they turned to Silverfort.

RWC and Silverfort: A Case Study

Reliance Worldwide Corporation is a publicly-traded leading manufacturer. Like many companies of its size, RWC cannot afford delays in production from a ransomware attack. That’s why they have implemented Silverfort’s solution to extend MFA to Entra ID (formerly Azure AD) and command line interfaces. By doing so they have gained the ability to prevent the […]

IndoSat and Silverfort: A Case Study

IndoSat explains how Silverfort addresses their concerns about identity-based attacks by providing continuous visibility and real-time risk analysis across all their network resources, includes those previously thought unprotectable.

Egan and Silverfort: A Case Study

In this testimonial from Egan, they discuss how Silverfort enabled them to extend their coverage to assets that could not be protected until today, such as homegrown/legacy applications, IT infrastructure, file systems, command-line tools, machine-to-machine access and more. Silverfort continuously monitors all access of users and service accounts across both cloud and on-premise environments, analyzes […]