{"id":16612,"date":"2024-03-11T17:47:53","date_gmt":"2024-03-11T16:47:53","guid":{"rendered":"https:\/\/ig.technology\/?page_id=16612"},"modified":"2024-03-26T16:57:01","modified_gmt":"2024-03-26T15:57:01","slug":"active-directory-security","status":"publish","type":"page","link":"https:\/\/ig.technology\/index.php\/active-directory-security\/","title":{"rendered":"Active Directory Security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"16612\" class=\"elementor elementor-16612\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d072e20 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent\" data-id=\"d072e20\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2b44519 elementor-widget elementor-widget-spacer\" data-id=\"2b44519\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9c5ae6e elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"9c5ae6e\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-4037edb\" data-id=\"4037edb\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0d2a5c0 elementor-widget elementor-widget-image\" data-id=\"0d2a5c0\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"640\" height=\"640\" src=\"https:\/\/ig.technology\/wp-content\/uploads\/2024\/03\/server.gif\" class=\"attachment-large size-large wp-image-16617\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-1481f47\" data-id=\"1481f47\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5b8f616 elementor-widget elementor-widget-heading\" data-id=\"5b8f616\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cybersecurity that works for you<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a3cc980 elementor-widget elementor-widget-text-editor\" data-id=\"a3cc980\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Protect the critical information you store \u2014 and the vehicles used to get to it \u2014 by bridging the gaps between your. Various security silos. Secure your organization across all the primary attack surfaces: data, identity and infrastructure.<\/p><div><div><div><strong>DATA SECURITY<\/strong><\/div><div>Data is what threat actors are after, so make sure you can secure it properly.<\/div><div>\u00a0<\/div><\/div><div><div><strong>IDENTITY SECURITY<\/strong><\/div><div>Identity is the new perimeter. Secure the identities of users and admins to protect your data and systems.<\/div><div>\u00a0<\/div><\/div><div><strong>INFRASTRUCTURE SECURITY<\/strong><br \/>Protect it all, from endpoints to servers, and from the data center to the cloud.<\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7b8b9f8 elementor-widget__width-initial elementor-widget elementor-widget-button\" data-id=\"7b8b9f8\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/ig.technology\/wp-content\/uploads\/2024\/03\/NETWRIX_Active-Directory-Auditing-Software_ENG_V2.pdf\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">English Flyer<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e9fb516 elementor-widget__width-initial elementor-widget elementor-widget-button\" data-id=\"e9fb516\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/ig.technology\/wp-content\/uploads\/2024\/03\/Netwrix_Active-Directory-Auditing-Software_ESP_V2.pdf\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Spanish Flyer<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-7db4ff2 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent\" data-id=\"7db4ff2\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bb58950 elementor-widget elementor-widget-spacer\" data-id=\"bb58950\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-30ca1690 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent\" data-id=\"30ca1690\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1d892f14 animated-slow elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"1d892f14\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;slideInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How can you ensure that your organization\nis more secure tomorrow than it is today?<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3d9a04c7 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-child\" data-id=\"3d9a04c7\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-dd5610a animated-slow e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no elementor-invisible e-con e-child\" data-id=\"dd5610a\" data-element_type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;animation_delay&quot;:150}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-60ccf8f elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"60ccf8f\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"flaticoninfetech- flaticon-infetech-target-1\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-55d8e552 elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"55d8e552\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">IDENTIFY<\/h3><\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-28894932 elementor-widget elementor-widget-text-editor\" data-id=\"28894932\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"card-sub-ttl w3_bg\"><div class=\"elementor-element elementor-element-0b9d6bf mobile-text-center elementor-widget elementor-widget-text-editor\" data-id=\"0b9d6bf\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><p>Identify and mitigate security risks by performing Active Directory security assessment. Active Directory is secure when it\u2019s clean, understood, properly configured, closely monitored and tightly controlled.\u00a0<\/p><\/div><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7ecd591 animated-slow e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no elementor-invisible e-con e-child\" data-id=\"7ecd591\" data-element_type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;animation_delay&quot;:150}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-348c1f4 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"348c1f4\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"flaticon flaticon-cloud-computing\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-253ddad elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"253ddad\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">PROTECT<\/h3><\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ab12737 elementor-widget elementor-widget-text-editor\" data-id=\"ab12737\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"card-sub-ttl w3_bg\"><div class=\"elementor-element elementor-element-0b9d6bf mobile-text-center elementor-widget elementor-widget-text-editor\" data-id=\"0b9d6bf\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><p>Rest assured your Active Directory is protected from security incidents. To minimize the risk of AD security breaches, organizations need to implement safeguards that protect Active Directory.<\/p><\/div><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a6e47bf animated-slow e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no elementor-invisible e-con e-child\" data-id=\"a6e47bf\" data-element_type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;animation_delay&quot;:150}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-472caf5 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"472caf5\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"flaticoninfetech- flaticon-infetech-shield\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7312212 elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"7312212\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">DETECT<\/h3><\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5e65fad elementor-widget elementor-widget-text-editor\" data-id=\"5e65fad\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"card-sub-ttl w3_bg\"><div class=\"elementor-element elementor-element-98de9dd mobile-text-center elementor-widget elementor-widget-text-editor\" data-id=\"98de9dd\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><p>Be confident that you can spot threats in time to prevent a breach. Because Active Directory is a mission-critical system, it is a prime target for adversaries. Ensure you can detect threats to Active Directory in time.<\/p><\/div><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1c2d0d1 animated-slow e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no elementor-invisible e-con e-child\" data-id=\"1c2d0d1\" data-element_type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;animation_delay&quot;:150}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-995278e elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"995278e\" data-element_type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"flaticoninfetech- flaticon-infetech-cloud-computing\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e41690c elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"e41690c\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">RESPOND<\/h3><\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-98ce9fc elementor-widget elementor-widget-text-editor\" data-id=\"98ce9fc\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Save the day by mitigating the impact of Active Directory security incidents. When an AD security incident occurs, every second counts. The Netwrix solution empowers security pros to respond quickly.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-692226f e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent\" data-id=\"692226f\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-66d9d0d elementor-widget elementor-widget-spacer\" data-id=\"66d9d0d\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c742ee8 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent\" data-id=\"c742ee8\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1bddfb4 elementor-widget elementor-widget-image\" data-id=\"1bddfb4\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/img.netwrix.com\/elements\/netwrix_logo.svg\" title=\"\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6c8db0f e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent\" data-id=\"6c8db0f\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-44d2b52 elementor-widget elementor-widget-video\" data-id=\"44d2b52\" data-element_type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=a3xfYaltlBE&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-becd34f e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent\" data-id=\"becd34f\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e4ce8b2 elementor-widget elementor-widget-spacer\" data-id=\"e4ce8b2\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e8dcb9b e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent\" data-id=\"e8dcb9b\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5f29171 elementor-widget elementor-widget-heading\" data-id=\"5f29171\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">End-to-End Active Directory Security Solution<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-da26583 elementor-widget elementor-widget-heading\" data-id=\"da26583\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Windows Active Directory is a prime target for attackers seeking access to your critical data and IT infrastructure<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-125c383 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"125c383\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-ede5845 animated-fast elementor-invisible\" data-id=\"ede5845\" data-element_type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;ova-move-up&quot;,&quot;animation_tablet&quot;:&quot;none&quot;,&quot;animation_delay&quot;:100}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1c28abc elementor-widget elementor-widget-infetech_elementor_service\" data-id=\"1c28abc\" data-element_type=\"widget\" data-widget_type=\"infetech_elementor_service.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t           \n           \t\n\t            <div class=\"ova-service ova-service-template1\">\n\n\t            \t<div class=\"image-service\">\n\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/images.pexels.com\/photos\/16018144\/pexels-photo-16018144\/free-photo-of-code-on-monitor.jpeg?auto=compress&#038;cs=tinysrgb&#038;w=1260&#038;h=750&#038;dpr=1\" alt=\"Assess your AD security posture\">\n                    <\/div>\n\n                    <div class=\"content-service-wrapper\">\n                    \t\t\t\t            \t<div class=\"icon\">\n\t\t\t            \t\t<i aria-hidden=\"true\" class=\"flaticon flaticon-cloud-computing-1\"><\/i>\t\t\t            \t<\/div>\n\t\t\t          \t\t\t\t          \t\n                    \t<div class=\"content-service\">\n\t\t\t\t            \t\t\t\t\t\t\t  <a href=\"https:\/\/www.cequence.ai\/solutions\/api-discovery-and-risk-classification\/\"  >\n\t\t\t\t\t\t    \t\t\t\t\t            \t\t\t\t\t\t\t\t\t<h4 class=\"title\">\n\t\t\t\t\t\t\t\t\t\tAssess your AD security posture\t\t\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t                    <\/div> \n                    <\/div>\n\n\t\t\t    <\/div>\n\n\t\t \t\t\t \t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-8788cce animated-fast elementor-invisible\" data-id=\"8788cce\" data-element_type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;ova-move-up&quot;,&quot;animation_tablet&quot;:&quot;none&quot;,&quot;animation_delay&quot;:150}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9ac4b60 elementor-widget elementor-widget-infetech_elementor_service\" data-id=\"9ac4b60\" data-element_type=\"widget\" data-widget_type=\"infetech_elementor_service.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t           \n           \t\n\t            <div class=\"ova-service ova-service-template1\">\n\n\t            \t<div class=\"image-service\">\n\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/images.pexels.com\/photos\/5380664\/pexels-photo-5380664.jpeg?auto=compress&#038;cs=tinysrgb&#038;w=1260&#038;h=750&#038;dpr=1\" alt=\"Control groups and group membership\">\n                    <\/div>\n\n                    <div class=\"content-service-wrapper\">\n                    \t\t\t\t            \t<div class=\"icon\">\n\t\t\t            \t\t<i aria-hidden=\"true\" class=\"flaticon flaticon-analytics\"><\/i>\t\t\t            \t<\/div>\n\t\t\t          \t\t\t\t          \t\n                    \t<div class=\"content-service\">\n\t\t\t\t            \t\t\t\t\t\t\t  <a href=\"https:\/\/www.cequence.ai\/solutions\/sensitive-data-exposure-remediation\/\"  >\n\t\t\t\t\t\t    \t\t\t\t\t            \t\t\t\t\t\t\t\t\t<h4 class=\"title\">\n\t\t\t\t\t\t\t\t\t\tControl groups and group membership\t\t\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t                    <\/div> \n                    <\/div>\n\n\t\t\t    <\/div>\n\n\t\t \t\t\t \t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-31773e5 animated-fast elementor-invisible\" data-id=\"31773e5\" data-element_type=\"column\" data-settings=\"{&quot;animation&quot;:&quot;ova-move-up&quot;,&quot;animation_tablet&quot;:&quot;none&quot;,&quot;animation_delay&quot;:200}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1f324f6 elementor-widget elementor-widget-infetech_elementor_service\" data-id=\"1f324f6\" data-element_type=\"widget\" data-widget_type=\"infetech_elementor_service.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t           \n           \t\n\t            <div class=\"ova-service ova-service-template1\">\n\n\t            \t<div class=\"image-service\">\n\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/images.pexels.com\/photos\/5380642\/pexels-photo-5380642.jpeg?auto=compress&#038;cs=tinysrgb&#038;w=1260&#038;h=750&#038;dpr=1\" alt=\"Respond to threats instantly\">\n                    <\/div>\n\n                    <div class=\"content-service-wrapper\">\n                    \t\t\t\t            \t<div class=\"icon\">\n\t\t\t            \t\t<i aria-hidden=\"true\" class=\"flaticon flaticon-cyber\"><\/i>\t\t\t            \t<\/div>\n\t\t\t          \t\t\t\t          \t\n                    \t<div class=\"content-service\">\n\t\t\t\t            \t\t\t\t\t\t\t  <a href=\"https:\/\/www.cequence.ai\/solutions\/api-governance-and-compliance\/\"  >\n\t\t\t\t\t\t    \t\t\t\t\t            \t\t\t\t\t\t\t\t\t<h4 class=\"title\">\n\t\t\t\t\t\t\t\t\t\tRespond to threats instantly\t\t\t\t\t\t\t\t\t<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t                    <\/div> \n                    <\/div>\n\n\t\t\t    <\/div>\n\n\t\t \t\t\t \t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-1a620bb e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no e-con e-parent\" data-id=\"1a620bb\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-285505a elementor-widget elementor-widget-spacer\" data-id=\"285505a\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cybersecurity that works for you Protect the critical information you store \u2014 and the vehicles used to get to it \u2014 by bridging the gaps between your. Various security silos. Secure your organization across all the primary attack surfaces: data, identity and infrastructure. DATA SECURITYData is what threat actors are after, so make sure you can secure it properly.\u00a0IDENTITY SECURITYIdentity is the new perimeter. Secure the identities of users and admins to protect your data and systems.\u00a0INFRASTRUCTURE SECURITYProtect it all, from endpoints to servers, and from the data center to the cloud. English Flyer Spanish Flyer How can you ensure that your organization is more secure tomorrow than it is today? IDENTIFY Identify and mitigate security risks by performing Active Directory security assessment. Active Directory is secure when it\u2019s clean, understood, properly configured, closely monitored and tightly controlled.\u00a0 PROTECT Rest assured your Active Directory is protected from security incidents. To minimize the risk of AD security breaches, organizations need to implement safeguards that protect Active Directory. DETECT Be confident that you can spot threats in time to prevent a breach. Because Active Directory is a mission-critical system, it is a prime target for adversaries. Ensure you can detect threats to Active Directory in time. RESPOND Save the day by mitigating the impact of Active Directory security incidents. When an AD security incident occurs, every second counts. The Netwrix solution empowers security pros to respond quickly. End-to-End Active Directory Security Solution Windows Active Directory is a prime target for attackers seeking access to your critical data and IT infrastructure Assess your AD security posture Control groups and group membership Respond to threats instantly<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-16612","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/ig.technology\/index.php\/wp-json\/wp\/v2\/pages\/16612","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ig.technology\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ig.technology\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ig.technology\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ig.technology\/index.php\/wp-json\/wp\/v2\/comments?post=16612"}],"version-history":[{"count":121,"href":"https:\/\/ig.technology\/index.php\/wp-json\/wp\/v2\/pages\/16612\/revisions"}],"predecessor-version":[{"id":18490,"href":"https:\/\/ig.technology\/index.php\/wp-json\/wp\/v2\/pages\/16612\/revisions\/18490"}],"wp:attachment":[{"href":"https:\/\/ig.technology\/index.php\/wp-json\/wp\/v2\/media?parent=16612"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}