Identity Threat Defense
Identity Threat Defense
Identity Threat Defense

Stop lateral movement and privilege escalation

Apply both proactive and reactive identity security controls to stop attacks

Overview

94% of successful attacks used Active Directory and privileged identities to move laterally after landing in an organization.

To quickly progress the attack, threat actors use a range of widely available tools. These tools help them exploit identities quickly and get to their ultimate targets without being detected. To combat this Proofpoint Identity Threat Defense continuously discovers and remediates identity vulnerabilities and detects and responds to active threats.

Benefits
discover, prioritize and remediate
shield icon
When attackers first land on a host or takeover an account, it’s rarely their ultimate destination. They need to escalate their privilege and move laterally to achieve their objective.
Fast detection and investigations
search icon
Are you relying on signatures or behavioral analysis for threat detection? Identity Threat Defense detects attacks using a wide-array of deceptions and agentless technology.
Integrate with other proofpoint products
cyber icon
Connecting the dots between active threats and high-priority risks and exploitable identity vulnerabilites is critical for both your proactive and reactive security defenses.
Key Features

Key Features of Identity Threat Defense 

Continuous discovery and remediation of identity vulnerabilities.

Identity Threat Defense continuously inspects Enterprise AD, Entra ID, PAMs and other identity repositories to discover, prioritize and remediate your identity vulnerabilities. You can detect:

  • User and service account misconfigurations and shadow administrators
  • Privilege Access Management (PAM) gaps
  • Existing endpoint-based exposures
Identity Threat Defense

Automatic risk remediation

Simplify and automate the cleanup of identity vulnerabilities:

  • Automatically purge risks from endpoints, both clients and servers
  • Leverage the identity risk dashboard and Attack Path Management for full visibility into priority risks
  • Effectively assess the risks of newly acquired IT environments
Identity Threat Defense

A unique agentless approach

With Identity Threat Defense you get a unique agentless approach that benefits both your IT administrators and security teams. It provides over 75 deception techniques distributed throughout your enterprise.

Identity Threat Defense

Accelerate threat detection and response

Detecting identity threats that evade detection.

  • Deception-based detection for fail-safe intruder detection
  • Extremely low false positive/false negative alert generation
  • Agentless deployment applying 75+ deception techniques
  • Automated forensic collection from the in-process attack provided to investigators

Undefeated in Red Team Exercises

Identity Threat Defense has successfully defended 160 Red Team attacks, with zero defeats.

Identity Threat Defense