Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 











Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

Digital Shadows integrates with Microsoft Azure AD

January 2021 by Marc Jacob

Digital Shadows announces that customers using Microsoft Azure Active Directory services will now gain near real-time alerts when the login credentials of their employees are deemed to be at risk. Last year, Digital Shadows uncovered more than 16 billion credentials (such as username and passwords) exposed online. However, many of these are outdated or nonexistent threats which is why the integration between Digital Shadows SearchLight™ and Azure AD will only flag current, critical threats which can be quickly addressed to reduce the risk of account takeover.

Microsoft Azure Active Directory manages more than 1.2 billion identities and processes over 8 billion authentications every day. Additionally, it also supports more than 2,800 pre-integrated software as a service (SaaS) applications. This makes it a critical sign in tool for businesses worldwide. It also provides a rich source of data to check the validity of current credentials and a valuable defense for Digital Shadows customers against the risk of account takeover.
This integration builds upon one announced last year with Okta and further increases the capability of SearchLight to enable security teams to easily validate exposed credentials and take action to keep attackers out of critical systems.

Features of the new Microsoft Azure AD integration in SearchLight, include the ability to:

 Identify exposed credentials in near real-time: Automated detection of exposed credentials across the broadest set of sources, with source info updated as it becomes available
 Reduce triage time with auto-rejection: Instant validation for usernames of both retrospective and recently raised exposed credential alerts
 Maintain multiple active directories: Support for organizations with multiple AD instances
 Security teams can ‘be in the know’ of all rejection activity: All automatic rejections are recorded in the activity log, helping security teams stay synchronized


See previous articles

    

See next articles












Your podcast Here

New, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr

All new podcasts