https://store-images.s-microsoft.com/image/apps.51313.d4b0911c-c01a-498a-ba70-383708105181.1b411aaa-35ec-4e46-a1f3-2213b5d8c570.eb333712-2799-40ac-8739-524ad31c4e3c

The Illusive Platform and Azure Active Directory

Illusive Networks
Defend privileged identities & block malicious lateral movement via AAD attack surface reduction
https://store-images.s-microsoft.com/image/apps.20068.d4b0911c-c01a-498a-ba70-383708105181.d1713848-1d4d-4169-a82e-0273ac639124.74ed8839-9d2e-484a-a84a-557a26126c78
/images/videoOverlay.png
https://store-images.s-microsoft.com/image/apps.20068.d4b0911c-c01a-498a-ba70-383708105181.d1713848-1d4d-4169-a82e-0273ac639124.74ed8839-9d2e-484a-a84a-557a26126c78
/images/videoOverlay.png
https://store-images.s-microsoft.com/image/apps.53441.d4b0911c-c01a-498a-ba70-383708105181.1b411aaa-35ec-4e46-a1f3-2213b5d8c570.2a10b1aa-3310-4698-8ecf-842035abb347
https://store-images.s-microsoft.com/image/apps.14695.d4b0911c-c01a-498a-ba70-383708105181.1b411aaa-35ec-4e46-a1f3-2213b5d8c570.1e41677c-feec-4eab-8514-5e1085f8f488

The Illusive Platform and Azure Active Directory

Illusive Networks

Defend privileged identities & block malicious lateral movement via AAD attack surface reduction

90% of global enterprise organizations use Active Directory (AD) as their primary method of authentication and user authorization. According to Microsoft, 95 million AD accounts are attacked daily. If attackers can penetrate AD, they can potentially gain access to the entire network.1

Organizations often find it a challenge to adapt on-premise cyber defenses when moving to the cloud, as cloud migration grows the attack surface significantly and accentuates security flaws in existing on-premise defenses. This creates discrepancies between AD and Azure identity policies that lead to unauthorized access and prolonged attacker dwell times in search of high-value assets.

The Illusive Platform enhances the visibility and monitoring of privileged identities in Azure Active Directory by identifying and eliminating pathways and credentials that attackers might leverage to move towards critical data stored there.

The integration between the Illusive Platform and Azure Active Directory allows organizations to:

·        Manage their attack surface by visualizing and automating the discovery of critical assets in the cloud

·        Find and remove redundant, excessively privileged, misconfigured or otherwise vulnerable users that attackers typically exploit to move laterally towards critical assets

·        Map and connect privileged users in the cloud and on-premise to identify, monitor and remediate any violations or inconsistencies

·        Obtain intelligence about privileged identity risk level on any given endpoint.


For additional information on the integration, users may visit the Illusive Networks documentation portal 

[1] Source

https://store-images.s-microsoft.com/image/apps.20068.d4b0911c-c01a-498a-ba70-383708105181.d1713848-1d4d-4169-a82e-0273ac639124.74ed8839-9d2e-484a-a84a-557a26126c78
/images/videoOverlay.png
https://store-images.s-microsoft.com/image/apps.20068.d4b0911c-c01a-498a-ba70-383708105181.d1713848-1d4d-4169-a82e-0273ac639124.74ed8839-9d2e-484a-a84a-557a26126c78
/images/videoOverlay.png
https://store-images.s-microsoft.com/image/apps.53441.d4b0911c-c01a-498a-ba70-383708105181.1b411aaa-35ec-4e46-a1f3-2213b5d8c570.2a10b1aa-3310-4698-8ecf-842035abb347
https://store-images.s-microsoft.com/image/apps.14695.d4b0911c-c01a-498a-ba70-383708105181.1b411aaa-35ec-4e46-a1f3-2213b5d8c570.1e41677c-feec-4eab-8514-5e1085f8f488