Cyber Risk Analytics Management - QOMPLX
  • Products
    Identity Threat Detection and Response (ITDR) Prevent, detect and respond to identity threats in real-time Learn more
    Privilege Assurance
    Identity Assurance
    Managed Detection and Response Cost-effective cybersecurity for small to medium-sized firms Learn more
    Attack Surface Monitoring Discover cyber vulnerabilities and size of your attack surface Learn more
    Q:SCAN
    Third Party
    White Paper

    ManyKatz: How Active Directory Hacks Went Mainstream

    Read more
  • Services
    Offensive Security Services Gain a hacker’s perspective on your network
    Active Directory Security Assessment Identify and mitigate AD security risks to your network
    vCISO On-demand cybersecurity experts
  • Resources
    Blog Check out important cybersecurity topics and the QOMPLX perspective Learn more
    Content hub Research thought leadership, product benefits, use cases, and more Learn more
    Case studies
    Data sheets
    Overviews
    Tech specs
    Videos
    Webinars
    Whitepapers
    Data Sheet

    QOMPLX Privilege Assurance AD data sheet

    Read more
  • Partners
  • Company
    About QOMPLX Gain unified visibility into cyber risks & trust in identity
    Events Want to meet QOMPLX? View our list of upcoming events and trade shows
    Newsroom Research current news about QOMPLX
    Contact Us Discuss your firm’s cyber challenges with an expert
    White Paper

    Aite Impact Brief: Fixing Vulnerabilities in Active Directory and Kerberos

    Read more
    • Login
    • Request a meeting
    • Request a demo
QOMPLX Knowledge: Responding to a Silver Ticket Attack
Blog

QOMPLX Knowledge: Responding to a Silver Ticket Attack

We have explained how Silver Ticket Kerberos forgeries work. No it’s time to talk about how to investigate and recover from them.
May 15, 2020 — 8 min read
Enterprise Security's Soft Underbelly: Authentication
Blog

Enterprise Security's Soft Underbelly: Authentication

In his latest article over at Raconteur.net, QOMPLX CEO Jason Crabtree takes on the enterprise's soft underbelly: threats to authentication systems including Active Directory and Kerberos.
May 11, 2020 — 2 min read
Recent Attacks Reveal Human-Directed Ransomware Playbook
Blog

Recent Attacks Reveal Human-Directed Ransomware Playbook

Recent targeted ransomware attacks remind us that securing Active Directory is imperative to containing threat actors already on a network.
May 11, 2020 — 5 min read
QOMPLX Operations: The Four Ps of SOCs Part 1 - People
Blog

QOMPLX Operations: The Four Ps of SOCs Part 1 - People

It is often said that people are the most important part of a Security Operations Center (SOC). In our latest report, we do a deep dive on how to build productive security teams in your SOC.
May 7, 2020 — 1 min read
QOMPLX Knowledge: Kerberoasting Attacks Explained
Blog

QOMPLX Knowledge: Kerberoasting Attacks Explained

Kerberoasting is an Active Directory attack technique targeting service account credentials. Password hashes for service accounts are stolen from memory and cracked off line.
May 6, 2020 — 5 min read
QOMPLX Knowledge: Pass-the-Ticket Attacks Explained
Blog

QOMPLX Knowledge: Pass-the-Ticket Attacks Explained

Pass-the-Ticket attacks enable attackers to steal valid Kerberos tickets and pass them to systems in order to access network resources.
May 4, 2020 — 5 min read
Qomplx

QOMPLX harnesses data to provide unified visibility into cyber risks and trust in identity.

  • Products
    • Identity Threat Detection and Response (ITDR)
    • Managed Detection and Response
    • Attack Surface Monitoring
  • Services
    • Offensive Security Services
    • Active Directory Security Assessment
    • vCISO
  • Resources
    • Blog
    • Content hub
    • Case studies
    • Data sheets
    • Overviews
    • Tech specs
    • Videos
    • Webinars
    • Whitepapers
  • Company
    • About QOMPLX
    • Newsroom
    • Events
    • Contact Us
    • Request a demo
    • Vulnerability Disclosure Policy

© 2023 QOMPLX. All Rights Reserved.

Privacy Policy Terms of Use Sitemap