AST *Fully Interactive* Magazine | Page 32

adversary compromises an endpoint , they will look for high-value assets .

www . AmericanSecurityToday . com August 2021 - Edition 57

Ultimately , they want to find the most valuable data before starting to steal or encrypt anything so that they can blackmail the target more effectively .

Attivo ’ s ADAssessor technology does just that , enabling defenders to identify things like configuration errors and potential attack paths through AD , while also helping them clean up exposed credentials across the network environment so adversaries can t make use of them .

A significant percentage of attackers will query AD , and , when they do , ADSecure will provide misleading information back to them .

Because the attacker cannot be sure what is real and what isn ’ t , this slows their attack and gives defenders more time to detect them .

The ability to lock down attack paths has also helped defenders take a step forward .

Before this technology al- lowed defenders to automate some elements of AD protec- tion , cleaning up AD was a time-consuming manual pro- cess .

Given AD s relative vulnerabil- ity and the high percentage of attacks that attempt to exploit it , ADSecure and ADAssessor have significantly boosted defenders ability to remain secure against today s most ad- vanced threats .

32