Illusive’s Identity Threat Detection and Response (ITDR) Solution Prevents Leading Cyberattack Vectors

The new release extends best-in-class identity vulnerability detection and remediation coverage; ITDR is an important cybersecurity practice to protect privileged accounts and credentials from cyberattacks

NEW YORK and TEL AVIV, Israel, October 25, 2022 /PRNewswire/ — Illusive, a leader in identity threat detection and response (ITDR), today announced the release of its enhanced ITDR solution, which enables organizations to protect privileged identities, which are at risk of cyberattack and regulatory non-compliance. Account takeover attacks, which evade traditional detection and reduce attack duration to days instead of months, have become the leading vector of cyberattacks.

According to Gartner®, “Deploying and maturing ITDR is a critical security practice.”1

Illusive’s ITDR solution, Illusive Spotlight™ and Illusive Shadow™, enable comprehensive detection of unmanaged, misconfigured and exposed identity risks that leave every organization vulnerable to attack. It delivers aggregated, prioritized and contextualized insights into identity risks, so security teams can focus on addressing their biggest risks first. Additionally, the solution fully automates remediation with no risk of business impact.

Illusive’s agentless approach examines directory structures (e.g., Active Directory), privileged access management (PAM) solutions (e.g., CyberArk, Delinea), endpoints, servers and services, revealing gaps between the intent of an organization’s identity security policies and the reality of their environment. Illusive prevents attacks by removing what attackers need to succeed: privileged account access.

New Features and Benefits in Illusive’s ITDR Solution include:

  • MITER ATT&CK Relationship to Risk – Relate identity risk factors to MITER ATT&CK tactics, procedures and sub-techniques. Dashboard-level information that provides an aggregated view of the percentage of identities vulnerable to any particular attack tactic, such as initial access, privilege escalation or credential access, that can be drill down to individual identities for an integrated view of risk.
  • Kerberoastable Accounts – Detect and remediate misconfigured Active Directory accounts with vulnerable Kerberos tickets that can be exploited by attackers to brute force credentials.
  • Active Directory Domains and Trusts – A graphical visualization of Active Directory forests, domains and trusts shows misconfigurations that could allow an attacker to move between domains.
  • ServiceNow integration – Integrate with ServiceNow to create identity-based incident tickets to facilitate identity risk resolution in the ServiceNow Incident module from within the Illusive console.
  • Integration of Delinea Centrify – Connect to the Delinea Centrify vault to continuously discover unmanaged accounts.
  • Azure AD Privilege Classification – Classify Azure AD user privileges based on automatically collected evidence, such as directory or subscription-level privileged roles.

Learn More – Illusive Spotlight™ Product Page

1Gartner, 2023 Planning Guide for Identity and Access Management, Mary Ruddy, Homan Farahmand, Erik Wahlstrom, Paul Rabinovich, David Chase, Nat Krishnan, Gautham Mudra, 10 October 2022.
Disclaimer: GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its US and international affiliates and is used herein with permission. All rights reserved.

About the Illusive

lllusive continuously detects and automatically mitigates privileged identity risks exploited in all ransomware and other cyberattacks. Despite best practice investments to protect identities, including PAM and MFA deployment, 1 in 6 enterprise endpoints harbor exploitable identity risks.

Illusive makes it easy for security teams to detect weak identities lying across an organization’s endpoints and servers, then remove them or deploy deception-based detection techniques as a compensatory control to stop the attackers. Illusive has participated in over 140 red team exercises and has never lost a single one!

Founded by nation state attackers, Illusive’s technology is trusted by large global financial firms, retailers, service organizations, and pharmaceutical companies.

For more information, visit www.illusive.com, contact us at [email protected] or follow on LinkedIn, @illusvenw at Twitter and Facebook.

SOURCE Illusive Networks



#Illusives #Identity #Threat #Detection #Response #ITDR #Solution #Prevents #Leading #Cyberattack #Vectors #Source Link #Illusive’s Identity Threat Detection and Response (ITDR) Solution Prevents Leading Cyberattack Vectors

Leave a Comment