Cyber Risk Analytics Management - QOMPLX
  • Products
    Identity Threat Detection and Response (ITDR) Prevent, detect and respond to identity threats in real-time Learn more
    Privilege Assurance
    Identity Assurance
    Managed Detection and Response Cost-effective cybersecurity for small to medium-sized firms Learn more
    Attack Surface Monitoring Discover cyber vulnerabilities and size of your attack surface Learn more
    Q:SCAN
    Third Party
    White Paper

    ManyKatz: How Active Directory Hacks Went Mainstream

    Read more
  • Services
    Offensive Security Services Gain a hacker’s perspective on your network
    Active Directory Security Assessment Identify and mitigate AD security risks to your network
    vCISO On-demand cybersecurity experts
  • Resources
    Blog Check out important cybersecurity topics and the QOMPLX perspective Learn more
    Content hub Research thought leadership, product benefits, use cases, and more Learn more
    Case studies
    Data sheets
    Overviews
    Tech specs
    Videos
    Webinars
    Whitepapers
    Data Sheet

    QOMPLX Privilege Assurance AD data sheet

    Read more
  • Partners
  • Company
    About QOMPLX Gain unified visibility into cyber risks & trust in identity
    Events Want to meet QOMPLX? View our list of upcoming events and trade shows
    Newsroom Research current news about QOMPLX
    Contact Us Discuss your firm’s cyber challenges with an expert
    White Paper

    Aite Impact Brief: Fixing Vulnerabilities in Active Directory and Kerberos

    Read more
    • Login
    • Request a meeting
    • Request a demo
Hardening Active Directory Blunts Ransomware Extortion Attacks
Blog

Hardening Active Directory Blunts Ransomware Extortion Attacks

Recent attacks against firms like NTT highlight why businesses must address critical authentication infrastructure and reduce privileged access to stem potential disruption from ransomware.
Jul 15, 2020 — 4 min read
QOMPLX Ideas: When Should You Start a Tech Program?
Blog

QOMPLX Ideas: When Should You Start a Tech Program?

Managing complexities is mandatory for companies. How can businesses be sure which technology programs to sign off on?
Jul 14, 2020 — 3 min read
Automating Re/Insurance Underwriting
Blog

Automating Re/Insurance Underwriting

On all counts, automation requires a fundamental rethink of how diverse data is captured, organized and analyzed throughout underwriting. In short, contracts must be “computable” to be extensibly and scalably automatable.
Jun 30, 2020 — 3 min read
QOMPLX Knowledge: 10 Active Directory Health Checks You Should Know
Blog

QOMPLX Knowledge: 10 Active Directory Health Checks You Should Know

Active Directory attacks and exploits of vulnerable identity infrastructure are part of more and more sophisticated intrusions. Here are 10 tips for locking down and monitoring your AD environment.
Jun 30, 2020 — 4 min read
QOMPLX Intelligence: Four Steps to Better OSINT Collection
Blog

QOMPLX Intelligence: Four Steps to Better OSINT Collection

Open source intelligence plays a growing part in both cyber offense and defense. In this report, QOMPLX Senior OSINT Specialist Joe Gray describes four ways that individuals and organizations can sharpen their open source intelligence gathering.
Jun 15, 2020 — 2 min read
Part 1: How to not get lost in translation
Blog

Part 1: How to not get lost in translation

The insurance industry struggles with language and translation issues, with multiple data formats and schema related to all elements of the insurance process. The introduction of an insurance-specific language is the solution.
Jun 11, 2020 — 4 min read
Qomplx

QOMPLX harnesses data to provide unified visibility into cyber risks and trust in identity.

  • Products
    • Identity Threat Detection and Response (ITDR)
    • Managed Detection and Response
    • Attack Surface Monitoring
  • Services
    • Offensive Security Services
    • Active Directory Security Assessment
    • vCISO
  • Resources
    • Blog
    • Content hub
    • Case studies
    • Data sheets
    • Overviews
    • Tech specs
    • Videos
    • Webinars
    • Whitepapers
  • Company
    • About QOMPLX
    • Newsroom
    • Events
    • Contact Us
    • Request a demo
    • Vulnerability Disclosure Policy

© 2023 QOMPLX. All Rights Reserved.

Privacy Policy Terms of Use Sitemap