Resources

All
White Paper
Videos
Webinars
Brochure
Alsid for Active Directory - Product brochure
<p><strong>Discover Alsid for Active Directory</strong></p> <p>&nbsp;</p> <p>This brochure describes how&nbsp;Alsid hardens your directory infrastructure, enriches your SOC capabilities with AD threat detection, and empowers your incident response and hunting teams into investigating AD-related threats.</p> <p>&nbsp;</p>
94
Video
Discover Alsid for AD
129
Use Case
Usecase - VINCI Energies
<p><strong>Use Case - Mergers &amp; Acquisitions</strong><br /> How VINCI Energies has achieved strong security boundaries on its ever-evolving Active Directory infrastructures</p>
136
Use Case
Usecase - Sanofi
<p><strong>Use Case - Worlwide critical infrastructures</strong><br /> How the pharmaceutical leader Sanofi successfully protects its global Active Directory infrastructures.</p>
137
Use Case
Usecase - Lagardere
<p><strong>Use Case - Managing the cost of cybersecurity </strong></p> <p>How Lagardère’s small entities optimally protect their Active Directory infrastructures with limited resources.</p>
138
Use Case
Usecase - Orange
<p><strong>Use Case - Enriching detection use-cases at scale</strong></p> <p>How the worldwide telecom operator Orange adopted an innovative way to detect breaches of its infrastructures</p>
139
Use Case
Use case - HKBN
<p><strong>Ensuring cyber security while driving innovation</strong><br /> How HKBN ensures security and data integrity while continuing as a leading, high growth IT&amp;T provider in Hong Kong and Southern China</p>
141
White Paper
Whitepaper - Episode 1
<p><strong>Migrating to Office 365, the secure way</strong></p> <p><strong>Cloud computing offers lower costs, flexibility, and greater capacity beyond the limited resources most organizations have in their datacenters.</strong></p> <p><br /> But migrating data and extending user identities to the cloud is not risk-free. Compromising user identities in the cloud can lead to very immediate exposure of sensitive files that are de facto accessible directly on the Internet. Moreover, and depending on the way data and users have been migrated, attackers can also leverage footholds on onpremise Active Directory to gain access to cloud data, and vice versa. In this whitepaper, ALSID looks at the different options for extending on-premise AD to Office 365, then discuss the available defense tactics for Office 365 and on-premise AD.</p>
186
White Paper
Whitepaper - Episode 2
<p><strong>A global threat to entreprises: the impact of Active Directory attacks</strong></p> <p><strong>If you are a CEO, CFO, CMO, or basically any non-IT member of a management team, you probably haven’t ever heard of Active Directory (AD). Nonetheless, you are using it every day, every hour, every minute when you log in to your device, open your emails, access an application, or share a file. It is the very foundation on which your IT infrastructure is built.</strong></p> <p>Naturally, you probably haven’t heard of what would happen if this vital pillar of your IT were compromised. You might even think this is an unrealistic scenario. Perhaps it’s nothing more than a thought experiment for security geeks who dream up zombie-apocalypse scenarios? We are so glad you are reading this paper. In this document, we present the global business impact<br /> of Active Directory attacks. We’ll present a threat that proved capable of halting factories, grounding airplanes, breaking brands, disrupting stock markets, and bankrupting corporations. We will help you materialize those risks with previous real-life occurrences where attacks wreaked havoc on some of the largest, most recognizable enterprises. We hope this will help raise awareness of a threat which, so far, has received too little attention from boards, and far too much attention from hackers.</p>
187
White Paper
Whitepaper - Episode 3
<p><strong>How to convince your C-Suite that Active Directory&nbsp;security matters</strong></p> <p><strong>Years of (over)simplification have taught our whole industry that attacks begin outside an enterprise, fly through its networks and endpoints, and eventually reach (and often sabotage) their data and vital assets.</strong></p> <p><br /> Unfortunately, this somewhat naive model has led senior management to ignore or neglect the security of the ubiquitous, all-powerful overseer that orchestrates literally everything in any given IT infrastructure: Active Directory (AD). As a consequence, it receives too little investment and brainwork from boards, and far too much attention from hackers. This document aims at providing tangible arguments to security managers and CISO for convincing their Board of Directors that the defense of their Active Directory is paramount to the security of their business.</p>
188
White Paper
Whitepaper - Episode 4
<p><strong>1 .5 Million lessons from the infamous Singhealth attack</strong></p> <p><strong>On January 10th, 2019, the Committee of Inquiry (COI) published its public report detailing the now-infamous SingHealth hack incident.</strong></p> <p>This 453-page report is already a difficult read for most security practitioners and, as long and exhaustive as it looks, the most determined readers amongst us might still feel unsatisfied by its lack of details on some of the attack’s critical steps.<br /> We provide here, in layman’s words, a description of the incident. We also try to bridge the information gaps to provide a clearer description of the attackers’ moves. While these deductions are not proven, cyber-criminals’ modus operandi are predictable enough to consider them probable. We will follow up on this article in the coming days to provide an analysis of what organizations can do to prevent this disaster from happening in the first place. And, in the unfortunate case that it may be too late, we will also discuss the most common options with regard to remediation steps and discuss whether they seem appropriate or not.</p>
189
Webinar
A secure Active Directory infrastructure [FR]
195

Get in touch

Let's explore together how Alsid can improve your products and services

Contact us