AI-based Identity Analytics
Few security teams pay sufficient attention to their Kerberos infrastructure – often citing its protocol complexity, as well as its operational ownership by IT. Despite the variety of telemetry being collected to your SIEM, you might be missing juicy stuff inherent in Kerberos-related activity.