DISRUPTING THE CYBER KILL CHAIN: HOW TO CONTAIN USE OF TOOLS AND PROTOCOLS

Preventing lateral movement and unauthorized domain access due to the misuse of network credentials – especially due to reconnaissance tools looking for weak spots – is a challenge plaguing many enterprises. In fact, it’s a decade-old security problem. A major issue for enterprises has been how to detect and contain the use of reconnaissance tools like BloodHound, authentication protocols such as NTLM, DCE/RPC, Kerberos, and Lightweight Directory Access Protocol (LDAP), as well as other IT tools like PsExec and Powershell that are being misused or exploited by attackers.

Download our Disrupting The Cyber Kill Chain white paper to learn how Falcon Identity Protection solution can:

  • Prevent lateral movement and unauthorized domain access due to the misuse of network credentials via reconnaissance tools
  • Block and easily contain PowerShell, PsExec, and other attacking tools
  • Deeply inspect authentication protocols such as NTLM, DCE/RPC, Kerberos, and LDAP to control protocol usage
  • Reduce the risk of credential forwarding, password cracking, and other credential-based attacks such as Pass-the-Hash and Golden Ticket

Want to learn more?

Submit the form below to receive the full 
Whitepaper
 directly to your inbox

Thank you

You can now open the 
Whitepaper
 below
Open 
Whitepaper
Open 
Whitepaper

Thank you

You can now open the 
Whitepaper
 below
Open 
Whitepaper
Open 
Whitepaper
If you have any questions or would like some additional information,please visit
PluralSight
.
Oops! Something went wrong while submitting the form.