Proofpoint

Proofpoint Identity Threat
Detection and Response (ITDR) 101

Live Demo Every Other Tuesday & Thursday | 10:00 AM CDT (UTC -05:00)

Join Us Here

In today’s evolving and growing enterprise infrastructure, do you know how many laterally moving identity vulnerabilities exist within your corporate environment at any given time? Illusive research has revealed that these types of exploitable identity security vulnerabilities are present in one out of every six endpoints. We tend to classify these vulnerabilities across three categories:

  • Unmanaged: Privileged accounts should be vaulted in privileged access management (PAM) solutions, but it can be challenging to obtain the visibility needed to fully inventory these accounts. Case in point, 87% of local admins are not enrolled in Microsoft’s “Local Administrator Password Solution.”
  • Misconfigured: Misconfigurations in Active Directory and other identity and access management (IAM) solutions can result in the creation of “shadow admins,” which have obtained unnecessarily elevated privileges through group policy or other configuration errors without visibility into their rights.
  • Exposed: Even when privileged identities are properly provisioned and managed, they can still become exposed during the normal course of business. Cached credentials are frequently stored on endpoints and servers in memory – registry or disk – where they can be extracted by commonly used attack tools.

Join this session to learn from Identity Threat Detection experts at Proofpoint, why we believe Identity is the new sophisticated vulnerability – one of the top vectors for cyberattacks – and how you can protect your people from attackers who exploit gaps between identities and your security systems.

© All Rights Reserved. Privacy Policy