Cyberattacks

ITDR Solution Prevents Top Vector of Cyberattack

New release extends best-in-class coverage of identity vulnerability discovery and remediation; ITDR is a crucial cybersecurity best practice to protect privileged accounts and credentials from cyberattacks

Illusive, a leader in identity threat detection and response (ITDR), today announced the release of its enhanced ITDR solution, enabling organizations to protect privileged identities, which are at risk of cyberattack and regulatory non-compliance. Account takeover attacks, which evade traditional detection and reduce attack dwell time to days instead of months, have become the top vector of cyberattacks.

According to Gartner®, “Deploying and maturing ITDR is a crucial security best practice.”1

Illusive’s ITDR solution, Illusive Spotlight™ and Illusive Shadow™, enables the comprehensive discovery of the unmanaged, misconfigured and exposed identity risks that leave every organization vulnerable to attack. It delivers aggregated, prioritized and contextualized insights into identity risks, so that security teams can focus on responding to their greatest risks first. Further, the solution fully automates remediation where there is no risk to business impact.

Illusive’s agentless approach scans directory structures (e.g., Active Directory), privileged access management (PAM) solutions (e.g., CyberArk, Delinea), endpoints, servers and services, revealing the gaps between the intention of an organization’s identity security policies and the reality of their environment. Illusive prevents attacks by taking away what attackers need to succeed: privileged account access.New Features and Benefits in Illusive’s ITDR Solution Include:

  • MITRE ATT&CK Risk Correlation – Associate identity risk factors to MITRE ATT&CK tactics, techniques and sub-techniques. Dashboard-level information indicating an aggregate view of the percentage of identities vulnerable to any specific attacker tactics, such as initial access, privilege escalation or credential access, which can be drilled down into the individual identities for an aggregated view of risk.
  • Kerberoastable Accounts – Discover and remediate misconfigured Active Directory accounts with vulnerable Kerberos tickets that can be exploited by attackers to brute force credentials.
  • Active Directory Domains & Trusts – A graphical visualization of Active Directory forests, domains and trusts reveals misconfigurations that could enable an attacker to move between domains.
  • ServiceNow Integration – Integrate with ServiceNow to create identity-based incident tickets to facilitate identity risk resolution in the ServiceNow Incident module from within the Illusive console.
  • Delinea Centrify Integration – Connect with Delinea Centrify vault to continuously discover unmanaged accounts.
  • Azure AD Privilege Classification – Classify Azure AD user privileges based on automatically collected evidence, such as directory or subscription level privileged roles.

Learn More – Illusive Spotlight™ Product Page

1Gartner, 2023 Planning Guide for Identity and Access Management, Mary Ruddy, Homan Farahmand, Erik Wahlstrom, Paul Rabinovich, David Chase, Nat Krishnan, Gautham Mudra, 10 October 2022.
Disclaimer: GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.

Visit AITechPark for cutting-edge Tech Trends around AI, ML, Cybersecurity, along with AITech News, and timely updates from industry professionals!

Related posts

Anti-malware Endpoint Platform Minerva Labs Posts Positive Results

Business Wire

Innovative NETSCOUT solution Protects Customers from Cyberattacks

Business Wire

Action1 expands into Europe, opens data center in Germany

PR Newswire