+
+

Related Products

  • Reflectiz
    18 Ratings
    Visit Website
  • SOCRadar Extended Threat Intelligence
    101 Ratings
    Visit Website
  • Criminal IP ASM
    18 Ratings
    Visit Website
  • ThreatLocker
    502 Ratings
    Visit Website
  • Chainguard
    49 Ratings
    Visit Website
  • A10 Defend Threat Control
    41 Ratings
    Visit Website
  • StrongDM
    100 Ratings
    Visit Website
  • Cortex
    16 Ratings
    Visit Website
  • Wiz
    1,439 Ratings
    Visit Website
  • ZeroPath
    2 Ratings
    Visit Website

About

The problem of attack path management requires a fundamentally different, unique methodology designed to help organizations understand, empirically quantify the impact, and eliminate identity-based attack path risks. Enterprise networks, user privileges, application permissions, and security group memberships are dynamic. Consider that in every system a privileged user logs into they leave behind tokens and credentials for adversaries to obtain. Because the connections and behaviors that form attack paths are continuously changing, the attack paths themselves must also be continuously mapped. The haphazard elimination efforts of AD misconfigurations provide zero security posture improvement and negatively impact team productivity. However, if you can empirically identify the specific misconfigurations that allow you to eliminate the largest number of attack paths you can generate meaningful security posture improvement and increase your team’s productivity.

About

Help Security Operations teams protect on-premises identities and correlate signals with Microsoft 365 using Microsoft Defender for Identity. Helps eliminate on-premises vulnerabilities to prevent attacks before they happen. Helps Security Operations teams use their time effectively by understanding the greatest threats. Helps Security Operations by prioritizing information so they focus on real threats, not false signals. Get cloud-powered insights and intelligence in each stage of the attack lifecycle with Microsoft Defender for Identity. Help Security Operations identify configuration vulnerabilities and get recommendations for resolving them with Microsoft Defender for Identity. Identity security posture management assessments are integrated directly with Secure Score for visibility. Prioritize the riskiest users in your organization using a user investigation priority score based on observed risky behavior and number of prior incidents.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Organizations searching for an attack path management solution that continuously maps and quantifies identity attack paths

Audience

An Identity Security landscape solution for businesses

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 5.0 / 5
ease 4.0 / 5
features 4.0 / 5
design 4.5 / 5
support 5.0 / 5

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

BloodHound Enterprise
Founded: 2017
United States
bloodhoundenterprise.io/our-solution/

Company Information

Microsoft
Founded: 1975
United States
www.microsoft.com/en-us/microsoft-365/security/identity-defender

Alternatives

Alternatives

Categories

Categories

Integrations

Axonius
Azure Marketplace
Azure Resource Manager
CardinalOps
ContraForce
Daylight
Delinea Cloud Access Controller
Kroll Cyber Risk
Microsoft 365
Microsoft Dynamics 365 Finance
Microsoft Dynamics Supply Chain Management
Microsoft Entra ID
Panaseer

Integrations

Axonius
Azure Marketplace
Azure Resource Manager
CardinalOps
ContraForce
Daylight
Delinea Cloud Access Controller
Kroll Cyber Risk
Microsoft 365
Microsoft Dynamics 365 Finance
Microsoft Dynamics Supply Chain Management
Microsoft Entra ID
Panaseer
Claim BloodHound Enterprise and update features and information
Claim BloodHound Enterprise and update features and information
Claim Microsoft Defender for Identity and update features and information
Claim Microsoft Defender for Identity and update features and information