• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
product walkthrough: silverfort's unified identity protection platform

Product Walkthrough: Silverfort’s Unified Identity Protection Platform

You are here: Home / General Cyber Security News / Product Walkthrough: Silverfort’s Unified Identity Protection Platform
November 20, 2023

In this article, we will offer a short overview of Silverfort’s platform, the first (and now only) unified id security platform on the market place. Silverfort’s patented technology aims to protect organizations from id-based mostly attacks by integrating with present id and obtain management solutions, these kinds of as Ad (Energetic Directory) and cloud-centered solutions, and extending protected accessibility controls like Risk-Primarily based Authentication and MFA (Multi-Factor Authentication) to all their sources. This features on-prem and cloud resources, legacy programs, command-line equipment and service accounts.

A latest report by Silverfort and Osterman Investigate discovered that 83% of businesses around the globe have knowledgeable knowledge breaches because of to compromised credentials. A lot of companies acknowledge that they are underprotected against identification-based mostly attacks, this kind of as lateral motion and ransomware. Assets like command-line entry instruments and legacy techniques, which are extensively made use of, are specifically demanding to guard.

Receiving Commenced: Utilizing the Dashboard

Below is a screenshot of Silverfort’s dashboard (determine 1). All round, it has a really intuitive user interface. On the left is a listing of consumer sorts: privileged buyers, typical people, and assistance accounts, and how they obtain resources: as a result of on-prem and cloud-based directories (Advert, Azure Advert, Okta), federation servers (Ping, ADFS), and VPN connections (RADIUS). The ideal facet of the screen displays a record of the distinctive source kinds end users endeavor to entry. The obtain attempts are represented by glowing dots.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


This exhibit showcases the platform’s exceptional differentiator – it’s the only option currently that’s capable of integrating with the total id infrastructure in the hybrid setting. With this integration in place, the various on-prem and cloud directories ahead every authentication and accessibility endeavor to Silverfort for examination and verdict no matter if to make it possible for entry or deny. In that fashion, true time safety for any person and useful resource is accomplished, as we are going to before long see in a lot more depth.

The dashboard also shows aggregations of useful id-connected info: number of authentication tries by protocols and directories, proportion of confirmed authentications, range of people and service accounts efficiently protected, and a breakdown of people by risk degree (medium, large, critical).

The system includes several modules with each one particular addressing a unique identification protection issue. We are going to now explore two of them: State-of-the-art MFA and Company Account Safety.

Guarding Methods with Highly developed MFA

MFA has established to be 1 of the most effective strategies to secure from identity-based attacks. On the other hand, having MFA defense on all network property is quite tough.

MFA usually depends on brokers and proxies, which implies some desktops will never be lined by it. Either since your network is much too huge to have proxies on every single solitary computer system, or mainly because not all desktops are capable of setting up brokers.

Want to see Silverfort in motion? Schedule a absolutely free demo with our workforce of authorities today!

In addition, command-line obtain resources, such as PsExec, PowerShell, and WMI, inspite of remaining greatly utilised by network admins, do not natively assistance MFA. These and other on-prem authentications are managed by Advert, but Ad authentication protocols (Kerberos, NTLM) have been basically not made for MFA, and attackers know that. Advert only checks no matter whether usernames and passwords match, so attackers making use of reputable credentials (which may perhaps or may possibly not be compromised) can obtain the network and start lateral movement and ransomware attacks devoid of Advert being aware of. Silverfort’s main edge is that it can truly enforce MFA on all of these, a thing other options won’t be able to.

On the coverage display (figure 2) you can look at existing policies or develop new kinds.

Unified Identity Protection PlatformFigure 2: Policy display screen

Generating a new plan appears very intuitive, as seen in figure 3. We require to determine the authentication variety, the appropriate protocols, what users, sources, and destinations the coverage addresses, and the motion needed. What comes about right here is really really easy, but remarkably clever. Ad sends all authentication and access requests to Silverfort. For each and every ask for, Silverfort analyzes its risk and connected guidelines to decide whether MFA is expected or not. Depending on the verdict, the user is granted entry, blocked, or requested to present MFA. In other words and phrases, the coverage mainly bypasses the inherent constraints of more mature protocols and enforces MFA on them.

Unified Identity Protection PlatformDetermine 3: Generating a coverage

Getting and Securing Service Accounts

Service accounts are a critical security problem owing to their large obtain privileges and very low to zero visibility. What’s more, support accounts are not individuals, so MFA is just not an selection, and so is password rotation with PAM, which might crash critical processes if their logins fail. In fact, all businesses have multiple company accounts, occasionally as lots of as 50% of their overall users, and lots of of them go unmonitored. That is why attackers enjoy compromised assistance accounts- they can use them for lateral motion below the radar and gain access to a huge amount of devices devoid of getting observed.

Determine 4 demonstrates the Services Accounts display. As Silverfort gets all authentication and obtain requests, it is capable to recognize services accounts by analyzing repetitive equipment behaviors.

Unified Identity Protection PlatformDetermine 4: Provider Accounts display screen

It appears like we have 162 accounts underneath machine-to-machine. We can filter them based on a variety of parameters. Predictability, for case in point, steps repeated entry to the identical resource or spot. Deviations from this sample can point out malicious exercise.

In figure 5, we can see supplemental details about our assistance accounts, this sort of as sources, places, risk indicators, privilege ranges, and usage.

Unified Identity Protection PlatformFigure 5: Provider account Investigation display

For just about every company account, procedures are instantly developed centered on its habits. All we have to do is pick concerning ‘alert’, ‘block’ and ‘alert to SIEM’, and permit the coverage (figure 6).

Unified Identity Protection PlatformFigure 6: Support account procedures

Final Views

Silverfort’s platform really achieves its target of unified id protection. Its skill to enforce MFA on pretty much any useful resource (such as command-line resources, legacy apps, file shares, and a lot of some others) and build guidelines in seconds is unparalleled. Owning entire visibility into all services accounts and last but not least staying able to defend them is particularly valuable. To conclude, Silverfort’s system delivers ground breaking identity security capabilities that are getting to be significantly needed just about every day.

Discovered this article interesting? Comply with us on Twitter  and LinkedIn to read through extra exclusive content material we publish.


Some pieces of this short article are sourced from:
thehackernews.com

Previous Post: «why defenders should embrace a hacker mindset Why Defenders Should Embrace a Hacker Mindset
Next Post: NetSupport RAT Infections on the Rise – Targeting Government and Business Sectors netsupport rat infections on the rise targeting government and»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Qilin Ransomware Adds “Call Lawyer” Feature to Pressure Victims for Larger Ransoms
  • Iran’s State TV Hijacked Mid-Broadcast Amid Geopolitical Tensions; $90M Stolen in Crypto Heist
  • 6 Steps to 24/7 In-House SOC Success
  • Massive 7.3 Tbps DDoS Attack Delivers 37.4 TB in 45 Seconds, Targeting Hosting Provider
  • 67 Trojanized GitHub Repositories Found in Campaign Targeting Gamers and Developers
  • New Android Malware Surge Hits Devices via Overlays, Virtualization Fraud and NFC Theft
  • BlueNoroff Deepfake Zoom Scam Hits Crypto Employee with MacOS Backdoor Malware
  • Secure Vibe Coding: The Complete New Guide
  • Uncover LOTS Attacks Hiding in Trusted Tools — Learn How in This Free Expert Session
  • Russian APT29 Exploits Gmail App Passwords to Bypass 2FA in Targeted Phishing Campaign

Copyright © TheCyberSecurity.News, All Rights Reserved.