Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
- Destacamos »
- software Anti Blanqueo
PR Newswire
NEW YORK and TEL AVIV, Israel, Feb. 24, 2022
NEW YORK and TEL AVIV, Israel, Feb. 24, 2022 /PRNewswire/ -- Illusive, the leader in identity risk management, today announced the publication of Analyzing Identity Risks (AIR) 2022, a cybersecurity research report that examines the unmanaged, misconfigured and exposed identity risks that leave all organizations vulnerable to attack, despite the deployment of privileged account management (PAM), multi-factor authentication (MFA) and other identity and access management (IAM) solutions. Illusive has witnessed these blind spots firsthand while working with numerous security teams in the financial services, healthcare, and retail sectors to produce this report.
The company also announced the launch of Illusive Spotlight™ and Illusive Shadow™, its patented identity risk management platform that enables organizations to automatically and continuously discover, mitigate and protect against identity risks.
According to Gartner®, "Many breaches are caused by security and identity tools that have been misconfigured, not fully configured or whose configurations are out of date."
Exploitable identity risks enable attackers to gain initial access, establish their persistence on a network, elevate their privileges, evade defenses, and accelerate their lateral movement until they have taken complete control.
Analyzing Identity Risks (AIR) 2022 includes quantitative insights into unmanaged, misconfigured and exposed identity risks, as well as real-world examples of how these identity risks manifest themselves. Key findings include:
"As ransomware attacks reach record-breaking levels, the complexity of managing Active Directory and the limitations of existing identity and access management solutions have created an identity security gap that attackers easily exploit," said Ofer Israeli, CEO & Founder, Illusive. "And it isn't just a gap – it's a major blindspot – this research is proof that organizations lack visibility into the identity risks that leave them vulnerable to an attack."
Announcing Illusive Spotlight™ and Illusive Shadow™
Illusive's platform is a full lifecycle identity risk management solution. Illusive Spotlight™ automatically and continuously discovers and mitigates privileged identity risks. Illusive Shadow™ protects against identity risks that can't be readily remediated. Key features include:
Read Now – Analyzing Identity Risks (AIR) 2022
Learn More – Illusive Spotlight™ Product Page
Contact Now – Complimentary Identity Risk Assessment
Disclaimer: GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.
About Illusive
lllusive continuously discovers and automatically mitigates privileged identity risks that are exploited in all ransomware and other cyberattacks. Despite best-practice investments to protect identities, including deployment of PAM and MFA, 1 in 6 enterprise endpoints holds exploitable identity risks.
Illusive makes it easy for security teams to get visibility into the vulnerable identities sprawled across an organization's endpoints and servers, then eliminate them or deploy deception-based detection techniques as a compensating control to stop attackers. Illusive has participated in over 140 red team exercises and has never lost one!
Founded by nation state attackers, Illusive's technology is trusted by large global financial companies, retailers, services organizations, and pharmaceutical companies.
For more information, visit www.illusive.com, contact us at info@illusive.com or follow on LinkedIn, @illusivenw on Twitter and Facebook.
Media Contact
Clinton Karr – Illusive
press@illusive.com
View original content:https://www.prnewswire.com/news-releases/illusive-research-reveals-identity-risks-on-1-in-6-enterprise-endpoints-301489350.html
SOURCE Illusive Networks
Publicamos interesante Informe de más de 48 págs y varios videos demostrativos sobre los posibles ataques a los robots de montaje de las fábricas. ... Leer más ►
Publicado el 22-Jun-2017 • 10.48hs
Publicado el 20-Jun-2017 • 20.22hs
Dirigido tanto a los principiantes, como a los expertos en seguridad informática y sistemas de control industrial (ICS), este libro ayudará a los lectores a comprender mejor la protección de normas de control interno de las amenazas electrónicas. ... Leer más ►
Publicado el 3-Ene-2012 • 20.16hs
Publicado el 25-Set-2009 • 01.26hs
Publicado el 17-Dic-2008 • 08.32hs