Stop lateral movement and privilege escalation
Apply both proactive and reactive identity security controls to stop attacks
94% of successful attacks used Active Directory and privileged identities to move laterally after landing in an organization.
To quickly progress the attack, threat actors use a range of widely available tools. These tools help them exploit identities quickly and get to their ultimate targets without being detected. To combat this Proofpoint Identity Threat Defense continuously discovers and remediates identity vulnerabilities and detects and responds to active threats.
When attackers first land on a host or takeover an account, it’s rarely their ultimate destination. They need to escalate their privilege and move laterally to achieve their objective.
Are you relying on signatures or behavioral analysis for threat detection? Identity Threat Defense detects attacks using a wide-array of deceptions and agentless technology.
Connecting the dots between active threats and high-priority risks and exploitable identity vulnerabilites is critical for both your proactive and reactive security defenses.
Key Features of Identity Threat Defense
Continuous discovery and remediation of identity vulnerabilities.
Identity Threat Defense continuously inspects Enterprise AD, Entra ID, PAMs and other identity repositories to discover, prioritize and remediate your identity vulnerabilities. You can detect:
- User and service account misconfigurations and shadow administrators
- Privilege Access Management (PAM) gaps
- Existing endpoint-based exposures
Automatic risk remediation
Simplify and automate the cleanup of identity vulnerabilities:
- Automatically purge risks from endpoints, both clients and servers
- Leverage the identity risk dashboard and Attack Path Management for full visibility into priority risks
- Effectively assess the risks of newly acquired IT environments
A unique agentless approach
With Identity Threat Defense you get a unique agentless approach that benefits both your IT administrators and security teams. It provides over 75 deception techniques distributed throughout your enterprise.
Accelerate threat detection and response
Detecting identity threats that evade detection.
- Deception-based detection for fail-safe intruder detection
- Extremely low false positive/false negative alert generation
- Agentless deployment applying 75+ deception techniques
- Automated forensic collection from the in-process attack provided to investigators
Undefeated in Red Team Exercises
Identity Threat Defense has successfully defended 160 Red Team attacks, with zero defeats.