Universal MFAでレガシーも守る 〜すべての認証に多要素を〜

MFAが適用できなかったレガシー環境でも安全性を確保できる方法をご存知ですか? 本セミナーでは、Silverfortが提供するMFAの拡張技術により、あらゆる環境で多要素認証を実現する方法を解説します。 目次(Agenda)
Accelerating Passkey Adoption with Microsoft, Yubico & Silverfort

Strengthen your cyber defences with FIDO2 and passkeys Adopting phishing-resistant authentication methods with FIDO2 and passkeys is essential to safeguarding your organisation against credential-based attacks. But success depends not only on the strength of the technology – it’s also about ease of deployment and user adoption at scale. In this webinar, hear from experts from […]
Beyond the Perimeter: Modernizing Active Directory Protection Against Lateral Movement and Privileged Access Abuse

Identity is the new perimeter – and attackers know it. Breaches don’t end with the first compromise. Adversaries move laterally through Active Directory (AD), abusing “legitimate” protocols like NTLM, Kerberos, RDP, and SSH that most tools mistake for normal traffic. The problem: AD doesn’t natively enforce MFA on these protocols. Common hops – PsExec, PowerShell, […]
Accélérez votre mise en conformité NIS2 avec Silverfort

Selon certaines estimations, plus de 15 000 organisations seront concernées par la transposition française de NIS 2. Les “entités essentielles” et “importantes” doivent donc préparer une feuille de route de mise en conformité afin d’accroitre leur résilience cyber, couvrant parmi tant d’autres sujets la sécurité de leurs annuaires, la gestion des comptes et des accès, […]
ゼロトラスト時代のアイデンティティ保護入門 〜Silverfortの全体像〜

ゼロトラストの本質とは何か? そして、なぜ今「アイデンティティ」が最重要なのか? 本セミナーでは、Silverfortの全体像を通じて、現代のサイバーセキュリティ戦略における課題とその解決策をわかりやすくご紹介します。 目次(Agenda)
An Identity Security Playbook: The What and The Why

Every security program needs a floor to stand on and a ceiling to grow into. In identity security, that floor is visibility, control, and the ability to act when something looks off. The ceiling is a strategy that holds up under pressure, even as your environment expands across cloud, hybrid, human, and machine identities. Most […]
Shining a light on the hidden risks of non-human identities

Non-human identities (NHIs) – like service accounts, API keys, certificates, tokens, automation scripts, and cloud roles – now outnumber human users 50 to 1 in the average enterprise. These machine identities can authenticate, move laterally, and access sensitive systems – yet they often operate without oversight, visibility, or proper controls. In this webinar, identity security […]
Winning the Privileged Access Battle: From Firefighting to Field Control

Identity security has a privileged access problem. Faced with massive complexity in securing your most important infrastructure, current approaches to controlling privileged access risk put you in firefighting mode & in the slow lane to winning. Rob Ainscough knows this firsthand. As Head of IAM at Tesco, he didn’t just follow the playbook — he […]
Schutz sensibler Konten ohne Umwege – Privileged Access neu gedacht

Administratorkonten sind ein Hauptziel für Angreifer. Wird eines kompromittiert, droht unbemerkter Zugriff auf das gesamte Netzwerk – mit gravierenden Folgen. Lange galten klassische Sicherheitsansätze wie Privileged Access Management (PAM) als ausreichend. Doch moderne Angriffstechniken und dynamische Infrastrukturen zeigen: Reaktive Maßnahmen greifen zu kurz. Notwendig ist ein proaktiver, identitätszentrierter Ansatz, der privilegierte Zugriffe in Echtzeit schützt. […]