Comply with New York State Department of Health’s Section 405.46 of Title 10 NYCRR

The New York State Department of Health (DOH)’s Title 10 NYCRR Section 405.46 requires healthcare facilities to implement strict cybersecurity measures, including data encryption, controlled access, and continuous electronic health records (EHR) monitoring. This ensures that hospitals maintain rigorous standards for protecting sensitive patient data, reinforcing both patient privacy and healthcare system resilience against cyber […]

Silverfort and Token2 Integration

Apply Token2 FIDO2 MFA protection and risk-based authentication to access requests for all on-prem and cloud resources, including those that could not be protected before. MFA is the most effective hardware-based security measure against identity-based attacks. However, extending FIDO2 MFA keys to all environments to provide secure access to critical resources has proven difficult. To […]

Silverfort Smart Policy for Service Accounts

Scale service account protection in bulk with behavior-based policies that never interfere with service operations. With Silverfort’s Smart Policy, customers can automatically create policies for groups of service accounts without disrupting critical services. Save the time and labor of creating policies one-by-one, monitoring for policy deviations and manually enforcing deny policies with this simple solution. […]

Silverfort’s PingFederate Bridge

With Silverfort’s PingFederate bridge, organizations can implement PingFederate web SSO flows to on-prem applications within their environment – and apply crucial security controls to these resources. Read this solution brief to discover:

Silverfort’s Okta Bridge

With Silverfort’s Okta bridge, organizations can implement Okta web SSO flows to on-prem applications within their environment – and gain real-time protection against identity-based attacks. Read this solution brief to discover:

Why Identity Security Is A Necessity

Identity security has become a top priority for all organizations. Traditional identity controls do not provide complete coverage, leaving critical resources exposed to malicious access and attacks that use compromised credentials, like lateral movement or ransomware. By not taking a proactive approach to identity security, you will always be one step behind malicious actors. Download […]

Safe and Impact-Free Usage of Silverfort on Your Domain Controllers

Ensuring your Active Directory Domain Controllers are secure and stable is more critical than ever. Silverfort understands the delicate balance between enhancing security and maintaining system stability. Our solution is designed with this balance in mind, ensuring that you can bolster your security posture without compromising the performance or reliability of your domain controllers. Download […]

Why Silverfort

Traditional identity controls fall short of providing complete coverage, leaving critical resources exposed to malicious access. With Silverfort, organizations can solve the critical identity security risks they’ve been struggling with for years – because we go where identity security has never gone before. Download this solution brief to understand what Silverfort does and why it’s […]

Silverfort for Microsoft Sentinel and Security Copilot

Traditional IAM solutions often lack the depth needed to detect ongoing malicious activity, particularly identity-based attacks. Silverfort bridges this gap by seamlessly integrating with Microsoft Sentinel, providing granular and analyzed identity-security data. This integration streamlines the investigation and response process for security analysts, enhancing their ability to quickly and accurately mitigate threats. Download this solution […]