adversary compromises an endpoint , they will look for high-value assets .
www . AmericanSecurityToday . com August 2021 - Edition 57
Ultimately , they want to find the most valuable data before starting to steal or encrypt anything so that they can blackmail the target more effectively .
Attivo ’ s ADAssessor technology does just that , enabling defenders to identify things like configuration errors and potential attack paths through AD , while also helping them clean up exposed credentials across the network environment so adversaries can ’ t make use of them .
A significant percentage of attackers will query AD , and , when they do , ADSecure will provide misleading information back to them .
Because the attacker cannot be sure what is real and what isn ’ t , this slows their attack and gives defenders more time to detect them .
The ability to lock down attack paths has also helped defenders take a step forward .
Before this technology al- lowed defenders to automate some elements of AD protec- tion , cleaning up AD was a time-consuming manual pro- cess .
Given AD ’ s relative vulnerabil- ity and the high percentage of attacks that attempt to exploit it , ADSecure and ADAssessor have significantly boosted defenders ’ ability to remain secure against today ’ s most ad- vanced threats .
32