All Rights Reserved. Semperis Inc. © 2021 | Privacy Policy | Terms of Use
IDENTITY RESILIENCE attracts industry experts committed to winning the battle against cybercriminals and the awful acts their illicit activities fund: narcotics, weapons, terrorism, human trafficking, and child exploitation. We're calling on you to join the conversation and take action.
Have meaningful dialogue
All Rights Reserved. Semperis Inc. © 2021
Active Directory Security Report Card
Pre- and Post-Attack Security Indicators
Prioritized, Actionable Guidance
Community-Driven Threat Models
MITRE ATT&CK Correlation
Attackers take advantage of weak Active Directory configurations to identify attack paths, access privileged credentials, and get a foothold into target networks. Purple Knight queries your Active Directory environment and performs a comprehensive set of tests against the most common and effective attack vectors to uncover risky configurations and security vulnerabilities. You receive prioritized, corrective guidance to close gaps before they get exploited by attackers.
IDENTIFY EXPOSURES
The hard truth is that Active Directory is a soft target for attackers attempting to steal credentials and deploy ransomware across your network. But securing Active Directory is difficult given its constant flux, the sheer number of settings, and increasingly sophisticated threat landscape. And with easy access to powerful hacking tools, even small-time criminals can be just as dangerous as sophisticated nation-state adversaries. Purple Knight is on a mission to help organizations combat the deluge of escalating attacks targeting Active Directory. Regardless of company size or industry, we believe that security programs must be empowered to safely challenge their defenses, find weak spots, and take immediate action.
Watch the demo on-demand
Watch now
INDICATORS OF COMPROMISE (IOCs)
Scan for IOCs to identify evidence of actual compromise. Learn how your Active Directory was breached, shine a light on backdoor accounts, and flag recent changes that look suspicious.
INDICATORS OF COMPROMISE (IOCs)
Scan for IOCs to identify evidence of actual compromise. Learn how your Active Directory was breached, shine a light on backdoor accounts, and flag recent changes that look suspicious.
INDICATORS OF EXPOSURE (IOEs)
Test against IOEs to uncover Active Directory configuration issues that attackers can easily exploit. Close attack paths and spot modifications that suggest nefarious behavior.
INDICATORS OF EXPOSURE (IOEs)
Test against IOEs to uncover Active Directory configuration issues that attackers can easily exploit. Close attack paths and spot modifications that suggest nefarious behavior.
OUR MISSION
HARDEN DEFENSES
To lockdown Active Directory, you must think like an attacker. Purple Knight maps pre- and post-attack security indicators to the MITRE ATT&CK framework, offering an overall risk score along with the likelihood of compromise and specific remediation steps. You can proactively harden your Active Directory against new adversary tactics and techniques with built-in threat modeling, which is constantly updated by a team of security experts.
Powered by
Powered by
Get the quick start guide
ABOUT SEMPERIS
For security teams charged with defending hybrid identity and multi-cloud environments, Semperis ensures integrity and availability of critical enterprise directory services at every step in the cyber kill chain and cuts disaster recovery time by 90%. Purpose-built for securing hybrid Active Directory, Semperis’ patented technology protects over 50 million identities from cyberattacks, data breaches, and operational errors. The world’s leading organizations trust Semperis to spot directory vulnerabilities, intercept cyberattacks in progress, and quickly recover from ransomware and other data integrity emergencies.
Download the datasheet
Watch the demo on-demand
Watch now
Version: Purple Knight 1.4 Community
Active Directory holds the “keys to the kingdom,” and if not safeguarded properly, it will compromise your entire security infrastructure. Purple Knight is a free Active Directory security assessment tool built and managed by an elite group of Microsoft identity experts.
Version: Purple Knight 1.4 Community
Active Directory holds the “keys to the kingdom,” and if not safeguarded properly, it will compromise your entire security infrastructure. Purple Knight is a free Active Directory security assessment tool built and managed by an elite group of Microsoft identity experts.
Version: Purple Knight 1.4 Community
Attackers take advantage of weak Active Directory configurations to identify attack paths, access privileged credentials, and get a foothold into target networks. Purple Knight queries your Active Directory environment and performs a comprehensive set of tests against the most common and effective attack vectors to uncover risky configurations and security vulnerabilities. You receive prioritized, corrective guidance to close gaps before they get exploited by attackers.
HARDEN DEFENSES
To lockdown Active Directory, you must think like an attacker. Purple Knight maps pre- and post-attack security indicators to the MITRE ATT&CK framework, offering an overall risk score along with the likelihood of compromise and specific remediation steps. You can proactively harden your Active Directory against new adversary tactics and techniques with built-in threat modeling, which is constantly updated by a team of security experts.
ABOUT SEMPERIS
For security teams charged with defending hybrid identity and multi-cloud environments, Semperis ensures integrity and availability of critical enterprise directory services at every step in the cyber kill chain and cuts disaster recovery time by 90%. Purpose-built for securing hybrid Active Directory, Semperis’ patented technology protects over 50 million identities from cyberattacks, data breaches, and operational errors. The world’s leading organizations trust Semperis to spot directory vulnerabilities, intercept cyberattacks in progress, and quickly recover from ransomware and other data integrity emergencies.
Download the datasheet
SHA256: 5e80a6d9e07ca12ab30b0814406aa221de894375145d8c780eb73a1f66cb06b
SHA256: 5e80a6d9e07ca12ab30b0814406aa221de894375145d8c780eb73a1f66cb06b
SHA256: 5e80a6d9e07ca12ab30b0814406aa221de894375145d8c780eb73a1f66cb06b
CHRIS VERMILYA | DIRECTOR OF IAM
For more information, visit our website at https://www.semperis.com/