Browse our resources.

From Active Directory to zero trust, you've come to the right place to level up your identity security knowledge.

Playbook

The Identity Security Playbook

The only Identity Security strategy you'll ever need. Get a 5-step action plan to cut risk, boost resilience, and protect every identity.

Checklist

The Identity Security Buyer’s Guide and RFP Checklist

Shortlist smarter, not harder. Get the no-fluff checklist that makes identity security RFPs actually manageable.

Securing Belgium’s rail freight operations: How Lineas gained control over AD and service account risks

Silverfort’s Visibility and Observability

Silverfort’s Identity Graph & Inventory

Introducing Silverfort’s Identity Graph & Inventory and Access Intelligence

Identity Under Attack: Detection Strategies That Work

Roadmap to shut down NTLM-based applications

認証ファイアウォールで実現するアイデンティティ・セグメンテーション〜ゼロトラストを支えるリスクベース制御の実践

Meeting TISAX compliance: How ASAP Holding secured legacy file access and service accounts

Solving key identity security challenges in mining with Silverfort

We dared to push identity security further.

Discover what’s possible.

Set up a demo to see the Silverfort Identity Security Platform in action.