www.semperis.com
Open in
urlscan Pro
75.2.46.245
Public Scan
Submitted URL: https://email.semperis.com/MjM5LUNQTi04NTEAAAGRBAzBF8cg4lun_3FmmO5JNOnW7dJm_1DHviJMnSTXK8A_iazu5vVOlNdf_5h2vvlZCab4K4c=
Effective URL: https://www.semperis.com/blog/swift-ransomware-response-business-resiliency/?mkt_tok=MjM5LUNQTi04NTEAAAGRBAzBF4gXWT2nfNOF...
Submission: On February 03 via api from US — Scanned from US
Effective URL: https://www.semperis.com/blog/swift-ransomware-response-business-resiliency/?mkt_tok=MjM5LUNQTi04NTEAAAGRBAzBF4gXWT2nfNOF...
Submission: On February 03 via api from US — Scanned from US
Form analysis
5 forms found in the DOM/
<form action="/" __bizdiag="115" __biza="WJ__">
<div class="input-holder">
<input type="text" name="s" placeholder="Search" value="">
</div>
<button>
<svg width="14" height="14" viewBox="0 0 14 14" fill="none" xmlns="http://www.w3.org/2000/svg">
<path
d="M10.0057 8.80503H9.37336L9.14923 8.58891C9.93368 7.67639 10.4059 6.49171 10.4059 5.20297C10.4059 2.32933 8.07662 0 5.20297 0C2.32933 0 0 2.32933 0 5.20297C0 8.07662 2.32933 10.4059 5.20297 10.4059C6.49171 10.4059 7.67639 9.93368 8.58891 9.14923L8.80503 9.37336V10.0057L12.8073 14L14 12.8073L10.0057 8.80503ZM5.20297 8.80503C3.20983 8.80503 1.60091 7.19611 1.60091 5.20297C1.60091 3.20983 3.20983 1.60091 5.20297 1.60091C7.19611 1.60091 8.80503 3.20983 8.80503 5.20297C8.80503 7.19611 7.19611 8.80503 5.20297 8.80503Z"
fill="#7B7A7A"></path>
</svg>
</button>
</form>
<form id="mktoForm_1164" novalidate="novalidate" class="mktoForm mktoHasWidth mktoLayoutLeft" style="font-family: Helvetica, Arial, sans-serif; font-size: 13px; color: rgb(51, 51, 51); width: 265px;" __bizdiag="2048253403" __biza="WJ__">
<style type="text/css">
.mktoForm .mktoButtonWrap.mktoInset .mktoButton {
color: #000;
background: #fff;
border: 1px solid #aeb0b6;
padding: 0.4em 1em;
font-size: 1em;
box-shadow: 1px 1px 6px 1px #ccc;
background-color: #f5f5f5;
background-image: -webkit-gradient(linear, left top, left bottom, from(#f5f5f5), to(#dfdfdf));
background-image: -webkit-linear-gradient(top, #f5f5f5, #dfdfdf);
background-image: -moz-linear-gradient(top, #f5f5f5, #dfdfdf);
background-image: linear-gradient(to bottom, #f5f5f5, #dfdfdf);
}
.mktoForm .mktoButtonWrap.mktoInset .mktoButton:hover {
border: 1px solid #999;
}
.mktoForm .mktoButtonWrap.mktoInset .mktoButton:focus {
outline: none;
border: 1px solid #999;
}
.mktoForm .mktoButtonWrap.mktoInset .mktoButton:active {
box-shadow: inset 1px 1px 6px 1px #ccc;
background-color: #dfdfdf;
background-image: -webkit-gradient(linear, left top, left bottom, from(#dfdfdf), to(#f5f5f5));
background-image: -webkit-linear-gradient(top, #dfdfdf, #f5f5f5);
background-image: -moz-linear-gradient(top, #dfdfdf, #f5f5f5);
background-image: linear-gradient(to bottom, #dfdfdf, #f5f5f5);
}
</style>
<div class="mktoFormRow">
<div class="mktoFieldDescriptor mktoFormCol" style="margin-bottom: 10px;">
<div class="mktoOffset" style="width: 10px;"></div>
<div class="mktoFieldWrap mktoRequiredField"><label for="Email" id="LblEmail" class="mktoLabel mktoHasWidth" style="width: 82px;">
<div class="mktoAsterix">*</div>Business Email
</label>
<div class="mktoGutter mktoHasWidth" style="width: 10px;"></div><input id="Email" name="Email" maxlength="255" aria-labelledby="LblEmail InstructEmail" type="email" class="mktoField mktoEmailField mktoHasWidth mktoRequired"
aria-required="true" style="width: 150px;" placeholder="Email Address"><span id="InstructEmail" tabindex="-1" class="mktoInstruction"></span>
<div class="mktoClear"></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow">
<div class="mktoFormCol" style="margin-bottom: 10px;">
<div class="mktoOffset mktoHasWidth" style="width: 10px;"></div>
<div class="mktoFieldWrap">
<div class="mktoHtmlText mktoHasWidth" style="width: 260px;"><span style="color: #808080; font-size: 10px;">By submitting, you agree that Semperis may use and process your personal information to send you information regarding its products
and services in accordance with the Semperis <a href="https://www.semperis.com/privacy-policy/" target="_blank" id="" style="color: #808080;">Privacy Policy</a>. You can opt out at any time.</span></div>
<div class="mktoClear"></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoClear"></div>
</div>
<script src="https://www.google.com/recaptcha/api.js?onload=captchaCallback" type="text/javascript" async="async" defer="defer"></script>
<div>
<script type="text/javascript">
var formId = 1164;
var captchaCallback = function(a) {
var b = document.getElementsByClassName("grecaptcha-badge");
if (b.length > 0)
for (var c = 0; c < b.length; c++) b[c].style.visibility = "hidden";
if (a) {
var d = this.MktoForms2.getForm(formId);
d && d.setCaptchaValue(a)
}
};
</script>
</div>
<div id="captcha" class="g-recaptcha" data-callback="captchaCallback" data-expired-callback="captchaExpired" data-sitekey="6LcMmSEnAAAAAJo5LvnKfpW3sC9NbOOvVXI0yOPY" data-size="invisible">
<div class="grecaptcha-badge" data-style="bottomright"
style="width: 256px; height: 60px; display: block; transition: right 0.3s ease 0s; position: fixed; bottom: 14px; right: -186px; box-shadow: gray 0px 0px 5px; border-radius: 2px; overflow: hidden; visibility: hidden;">
<div class="grecaptcha-logo"><iframe title="reCAPTCHA" width="256" height="60" role="presentation" name="a-lxfasdbhkes0" frameborder="0" scrolling="no"
sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox allow-storage-access-by-user-activation"
src="https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LcMmSEnAAAAAJo5LvnKfpW3sC9NbOOvVXI0yOPY&co=aHR0cHM6Ly93d3cuc2VtcGVyaXMuY29tOjQ0Mw..&hl=en&v=MHBiAvbtvk5Wb2eTZHoP1dUd&size=invisible&cb=qshi3xl4egqp"></iframe>
</div>
<div class="grecaptcha-error"></div><textarea id="g-recaptcha-response" name="g-recaptcha-response" class="g-recaptcha-response"
style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
</div>
</div>
<div class="mktoCaptchaDisclaimer">This site is protected by reCAPTCHA and the Google <a href="https://policies.google.com/privacy" target="_blank">Privacy Policy</a> and
<a href="https://policies.google.com/terms" target="_blank">Terms of Service</a> apply.</div>
<div class="mktoButtonRow"><span class="mktoButtonWrap mktoInset" style="margin-left: 120px;"><button type="submit" class="mktoButton button"><span data-label="Submit"><span>Submit</span></span></button></span></div><input type="hidden"
name="formid" class="mktoField mktoFieldDescriptor" value="1164"><input type="hidden" name="munchkinId" class="mktoField mktoFieldDescriptor" value="239-CPN-851">
</form>
<form id="mktoForm_1039" __bizdiag="196351687" __biza="WJ__" novalidate="novalidate" class="mktoForm mktoHasWidth mktoLayoutLeft" style="font-family: Helvetica, Arial, sans-serif; font-size: 13px; color: rgb(51, 51, 51); width: 265px;">
<style type="text/css">
.mktoForm .mktoButtonWrap.mktoInset .mktoButton {
color: #000;
background: #fff;
border: 1px solid #aeb0b6;
padding: 0.4em 1em;
font-size: 1em;
box-shadow: 1px 1px 6px 1px #ccc;
background-color: #f5f5f5;
background-image: -webkit-gradient(linear, left top, left bottom, from(#f5f5f5), to(#dfdfdf));
background-image: -webkit-linear-gradient(top, #f5f5f5, #dfdfdf);
background-image: -moz-linear-gradient(top, #f5f5f5, #dfdfdf);
background-image: linear-gradient(to bottom, #f5f5f5, #dfdfdf);
}
.mktoForm .mktoButtonWrap.mktoInset .mktoButton:hover {
border: 1px solid #999;
}
.mktoForm .mktoButtonWrap.mktoInset .mktoButton:focus {
outline: none;
border: 1px solid #999;
}
.mktoForm .mktoButtonWrap.mktoInset .mktoButton:active {
box-shadow: inset 1px 1px 6px 1px #ccc;
background-color: #dfdfdf;
background-image: -webkit-gradient(linear, left top, left bottom, from(#dfdfdf), to(#f5f5f5));
background-image: -webkit-linear-gradient(top, #dfdfdf, #f5f5f5);
background-image: -moz-linear-gradient(top, #dfdfdf, #f5f5f5);
background-image: linear-gradient(to bottom, #dfdfdf, #f5f5f5);
}
</style>
<div class="mktoFormRow">
<div class="mktoFieldDescriptor mktoFormCol" style="margin-bottom: 10px;">
<div class="mktoOffset" style="width: 10px;"></div>
<div class="mktoFieldWrap mktoRequiredField"><label for="Email" id="LblEmail" class="mktoLabel mktoHasWidth" style="width: 82px;">
<div class="mktoAsterix">*</div>Business Email
</label>
<div class="mktoGutter mktoHasWidth" style="width: 10px;"></div><input id="Email" name="Email" placeholder="Business Email" maxlength="255" aria-labelledby="LblEmail InstructEmail" type="email"
class="mktoField mktoEmailField mktoHasWidth mktoRequired" aria-required="true" style="width: 150px;"><span id="InstructEmail" tabindex="-1" class="mktoInstruction"></span>
<div class="mktoClear"></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoFormRow">
<div class="mktoFormCol" style="margin-bottom: 10px;">
<div class="mktoOffset mktoHasWidth" style="width: 10px;"></div>
<div class="mktoFieldWrap">
<div class="mktoHtmlText mktoHasWidth" style="width: 260px;"><span style="color: #808080; font-size: 10px;">By submitting, you agree that Semperis may use and process your personal information to send you information regarding its products
and services in accordance with the Semperis <a href="https://www.semperis.com/privacy-policy/" target="_blank" id="" style="color: #808080;">Privacy Policy</a>. You can opt out at any time.</span></div>
<div class="mktoClear"></div>
</div>
<div class="mktoClear"></div>
</div>
<div class="mktoClear"></div>
</div>
<script src="https://www.google.com/recaptcha/api.js?onload=captchaCallback" type="text/javascript" async="async" defer="defer"></script>
<div>
<script type="text/javascript">
var formId = 1039;
var captchaCallback = function(a) {
var b = document.getElementsByClassName("grecaptcha-badge");
if (b.length > 0)
for (var c = 0; c < b.length; c++) b[c].style.visibility = "hidden";
if (a) {
var d = this.MktoForms2.getForm(formId);
d && d.setCaptchaValue(a)
}
};
</script>
</div>
<div id="captcha" class="g-recaptcha" data-callback="captchaCallback" data-expired-callback="captchaExpired" data-sitekey="6LcMmSEnAAAAAJo5LvnKfpW3sC9NbOOvVXI0yOPY" data-size="invisible">
<div class="grecaptcha-badge" data-style="none" style="width: 256px; height: 60px; position: fixed; visibility: hidden;">
<div class="grecaptcha-logo"><iframe title="reCAPTCHA" width="256" height="60" role="presentation" name="a-7cvc7tyizi8i" frameborder="0" scrolling="no"
sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox allow-storage-access-by-user-activation"
src="https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LcMmSEnAAAAAJo5LvnKfpW3sC9NbOOvVXI0yOPY&co=aHR0cHM6Ly93d3cuc2VtcGVyaXMuY29tOjQ0Mw..&hl=en&v=MHBiAvbtvk5Wb2eTZHoP1dUd&size=invisible&cb=b37x42p6k74z"></iframe>
</div>
<div class="grecaptcha-error"></div><textarea id="g-recaptcha-response-1" name="g-recaptcha-response" class="g-recaptcha-response"
style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
</div><iframe style="display: none;"></iframe>
</div>
<div class="mktoCaptchaDisclaimer">This site is protected by reCAPTCHA and the Google <a href="https://policies.google.com/privacy" target="_blank">Privacy Policy</a> and
<a href="https://policies.google.com/terms" target="_blank">Terms of Service</a> apply.</div>
<div class="mktoButtonRow"><span class="mktoButtonWrap mktoInset" style="margin-left: 120px;"><button type="submit" class="mktoButton button"><span data-label="Submit"><span>Submit</span></span></button></span></div><input type="hidden"
name="formid" class="mktoField mktoFieldDescriptor" value="1039"><input type="hidden" name="munchkinId" class="mktoField mktoFieldDescriptor" value="239-CPN-851">
</form>
<form novalidate="novalidate" class="mktoForm mktoHasWidth mktoLayoutLeft" style="font-family: Helvetica, Arial, sans-serif; font-size: 13px; color: rgb(51, 51, 51); visibility: hidden; position: absolute; top: -500px; left: -1000px; width: 1600px;"
__bizdiag="-2121169767" __biza="WJ__"></form>
<form __bizdiag="-2121169767" __biza="WJ__" novalidate="novalidate" class="mktoForm mktoHasWidth mktoLayoutLeft"
style="font-family: Helvetica, Arial, sans-serif; font-size: 13px; color: rgb(51, 51, 51); visibility: hidden; position: absolute; top: -500px; left: -1000px; width: 1600px;"></form>
Text Content
Press Alt+1 for screen-reader mode, Alt+0 to cancelAccessibility Screen-Reader Guide, Feedback, and Issue Reporting Semperis Named to Fortune Magazine’s Cyber 60 List of Fastest Growing Cybersecurity Startups * Why Semperis WHY SEMPERIS * Tour the Identity Resilience PlatformHybrid AD attack prevention, detection, response, and recovery * Our CustomersLearn why industry-leading organizations trust Semperis * Our Unrivaled AD Security ExpertiseNo other vendor can outmatch Semperis’ collective Microsoft MVP experience in Directory Services and Group Policy * Purple Knight ArsenalCheck out our free community tools built by and for AD security pros * Hybrid Identity Protection (HIP) ConferenceAttend the award-winning conference series for identity-first security practitioners INDUSTRY Verticals * Critical Infrastructure * Financial services * Healthcare * Insurance * Retail * Public Sector * Transportation SEMPERIS MAKES THE DELOITTE TECH FAST 500 LIST THREE YEARS IN A ROW Semperis ranks in the top 15% with three-year revenue growth of over 2,800% Read the news Back * Identity Resilience Platform PLATFORM PRODUCTS * Directory Services ProtectorHybrid AD threat prevention, detection, and response * Active Directory Forest RecoveryCyber-first AD disaster recovery * Migrator for ADSecurity-first AD migration and consolidation * Disaster Recovery for Entra TenantBackup and recovery for Entra ID resources * Purple KnightCommunity tool: Hybrid AD security assessment * Forest DruidTier 0 attack path discovery SOLUTIONS * AD Migration & Consolidation * AD Attack Surface Reduction * Tier 0 Attack Path Analysis * AD Threat Detection & Response * AD Change Auditing & Rollback * AD Backup & Recovery * Active Directory Breach Forensics * Breach Preparedness & Response Services SEMPERIS RANKS TOP FIVE FASTEST GROWING CYBERSECURITY COMPANIES IN AMERICA Semperis named to the INC. 500 list for the second consecutive year Tour our platform products Back * Partners PARTNER WITH SEMPERIS * Partner OverviewLearn about Semperis' 100% channel sales approach, guaranteed margins, and free security assessment tools for partners * Find a PartnerSearch our vast partner network * Partner Portal * Become a Partner * Request access to Purple Knight post-breach partner edition SEMPERIS WINS CRN’S PRESTIGIOUS PARTNER PROGRAM GUIDE TWO CONSECUTIVE YEARS Designation highlights Semperis’ innovative alliances with global solution providers that help organizations protect hybrid identity environments from cyberattacks Partner Overview Back * Resources Resource hub * AD Security Glossary * Blog * Case Studies * Reports * Videos * Webinars * White Papers * Purple Knight Docs THE CISO'S TAKE ON IDENTITY-FIRST SECURITY FEATURING SIMON HODGKINSON Watch now * Visit our video channel * Tune in to our HIP Podcast Back * Company * About Us * Awards * Careers * Contact Us * Events * FAQ * In the News * Life at Semperis * Newsroom * Press Releases * Open positions * Request a demo SEMPERIS NAMED TO FORTUNE MAGAZINE'S 2023 CYBER 60 LIST' Find out more Back REQUEST A DEMO EXPERIENCING A BREACH? * Blog * Contact Us * Support * English * Deutsch * Español * Français * Italiano * Português REQUEST A DEMO EXPERIENCING A BREACH? Back to all news A SWIFT RANSOMWARE RESPONSE IS THE PATH TO BUSINESS RESILIENCY * Active Directory Backup & Recovery * Dec 22, 2023 * Read 4 MIN Mickey Bresman CEO, Semperis Cyberattacks on business systems—including hybrid identity systems—continue to make headlines, including recent breaches targeting healthcare company Henry Schein and hospitality conglomerate MGM Resorts. Apart from these well-publicized attacks, the Semperis Breach Preparedness & Response Services team has seen a spike in requests from our customers (and our partners’ customers) to help them recover from identity-related attacks. During these incident response (IR) engagements, I’ve observed stark differences in the recovery time and the impact it has on various organizations, which got me thinking about the resiliency level of these companies. What is the difference between a company that bounces back in a relatively short amount of time after an identity-related attack versus a company whose recovery drags on for days or weeks, incurring huge costs to the organization? From my firsthand experience, I’ve concluded that the biggest difference is the organization’s ability to orchestrate, automate, and test the recovery process. BACKUPS ARE ONLY THE BEGINNING Having backups is of course an essential starting point for business recovery. Although this shouldn’t be the case today, some companies still struggle with offline/offsite backup policies and procedures. In the case of a cyberattack that takes down the Active Directory environment, we’ve often seen that the first encryption target is the backup and recovery server on the company network. Once the attackers successfully encrypt the backup system, they move on to encrypt the rest of the organization. Recommendation: Make sure you have offline/offsite backups that cannot be accessed by using the same credentials as the rest of your production network. THE RECOVERY PROCESS CAN BE A STUMBLING BLOCK A convoluted recovery procedure also can delay the return to normal business operations. The best approach for recovery is “practice makes progress.” In many IR cases we’re pulled into, the biggest portion of the recovery timeline is spent on getting the right people to approve the recovery process. But other aspects of the recovery that seem obvious—such as maintaining an offline list of key contacts and organizing shift schedules for expert responders—also are overlooked, which adds complication to an inherently chaotic situation. Gartner analysts Wayne Hankins and Craig Porter recently pointed out the importance of speed in recovering from a ransomware attack: “CISOs responsible for preparing for ransomware attacks must build resilience by developing a containment strategy they can execute during a ransomware attack. Failure to do so will increase the risk of uncoordinated and ineffective response, prolonging the recovery time.” Although Gartner doesn’t provide specific instructions on how to build the recovery playbook, I can attest that the more details an organization captures, the faster the recovery will go. Uncovering those details requires practicing every step of the recovery journey. Recommendation: Make sure you have a well-documented IR procedure that provides details about all aspects of the recovery process—and verify that this information can be accessed even if the network is down. Basic information (we’ll publish a more comprehensive list in the future and link to it here) includes: * Who needs to approve various steps in the process—for example, who can authorize initiating the Active Directory recovery procedure? * Who are your key vendors (this list might be different for an IR case as compared to vendors for normal IT operations), and where is their contact information? * What SLAs are in place with your vendors? TIME IS THE CRITICAL FACTOR IN RECOVERY SUCCESS After we’ve retrieved the backups and the recovery procedure has been approved, the next challenge is time. Time is the one factor that is working against you. I would argue that given enough time and access to valid backups, any environment can be recovered. But extensive time to recover can cause irreparable harm to the organization. There is a direct connection between operational downtime and the damage cost to the organization. While it’s not common for recovery efforts to fail completely, the costs associated with excessive downtime can be devastating. Accurately assessing the all-in costs of downtime is notoriously difficult, and the final tally will vary based on the size of the organization and the industry. Gartner’s 2014 estimate that IT downtime costs organizations, on average, $5,600 a minute is still used as a benchmark. Gartner recently reported that costs for recovering from ransomware attacks in particular rose 20% in 2023 compared to 2022. But again, downtime costs can vary wildly: According to Forbes, the average automotive manufacturer loses $22,000 per minute when the production line stops. The relevant question is not what the industry average downtime cost is. The important consideration is how much downtime will cost your organization—not only in hard costs but also in reputational, legal, and regulatory damages. Recommendation: Make sure you orchestrate and automate as much of the recovery process as possible. Orchestrated recovery with complex systems can make the difference between days and weeks of recovery time versus minutes and hours. For instance, it took Maersk nine days just to recover their Active Directory following the NotPetya attack. In the same environment, but with an orchestrated solution, the time to recover can be reduced to 30 minutes. POST-BREACH SECURITY PREVENTS FOLLOW-ON ATTACKS Once the recovery has been completed, ensuring the environment is secured and can be trusted is the last major effort in the recovery process. The last thing that you want is to expose the recovered environment too soon, which could open the door for attackers to immediately return and take it down again. You need to identify and eradicate lingering malware before returning systems to production. Recommendation: Make sure your IR process includes a well-defined process for securing the environment post recovery. The procedure should include scanning all systems for indicators of exposure (IOEs), indicators of compromise (IOCs), and potential indicators of attack (IOAs). FOCUS ON REDUCING DOWNTIME TO IMPROVE CYBER RESILIENCY Preparing for the worst-case scenario is the first step in ensuring your organization can survive a cyber disaster. The number and severity of attacks on organizations of every size, every vertical market, and every geographic location rises with each passing month. Based on my experience in helping organizations recover from devastating attacks, I urge every business leader to prioritize developing a fully tested, cyber-first disaster recovery plan. Although you can’t prevent every cyberattack, you can dramatically reduce the time to recover. That reduced downtime could be the factor that determines whether your business survives. MORE RESOURCES * 4 Reasons to Increase Recoverability of Entra ID Resources – Semperis * How to Defend Against MFA Fatigue Attacks: Semperis AD 101 * Active Directory Security Best Practices | Semperis SIGN UP FOR THE LATEST SEMPERIS NEWS * Business Email By submitting, you agree that Semperis may use and process your personal information to send you information regarding its products and services in accordance with the Semperis Privacy Policy. You can opt out at any time. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply. Submit * AD threat detection & response Directory Services Protector * Cyber-first AD disaster recovery Active Directory Forest Recovery * Security-first AD migration and consolidation Migrator for Active Directory * Backup and recovery for Entra ID resources Disaster Recovery for Entra Tenant * Hybrid AD security assessment Purple Knight * Tier 0 attack path discovery Forest Druid * Why Semperis * Tour the Platform * Our Customers * Solutions * AD Migration & Consolidation * AD Attack Surface Reduction * Tier 0 Attack Path Analysis * AD Threat Detection & Response * AD Backup & Recovery * AD Change Auditing & Rollback * Breach Preparedness & Response Services * Active Directory Breach Forensics * Resources * Blog * Case Studies * Reports * Videos * White Papers * Industry * Critical Infrastructure * Financial Services * Healthcare * Insurance * Public Sector * Retail * Transportation * Partners * Partner Overview * Find a Partner * Become a Partner * Company * About Us * Careers * Events * Life at Semperis * FAQ * Support * Newsroom * Awards * Press Releases * In the News * Request a Demo * Experiencing a Breach? * Active Directory Security Stay Current with Semperis Sign up for updates. * Business Email By submitting, you agree that Semperis may use and process your personal information to send you information regarding its products and services in accordance with the Semperis Privacy Policy. You can opt out at any time. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply. Submit * * © 2024 Semperis. All Rights Reserved. * Privacy policy * Terms of use By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. For more information, see our Privacy Policy. Cookies Settings Options Accept All Cookies Your Opt Out Preference Signal is Honored PRIVACY PREFERENCE CENTER When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. More information User ID: e94e5c0e-11d7-41d4-a8f0-6b931698a9dc Allow All MANAGE CONSENT PREFERENCES FUNCTIONAL COOKIES Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. STRICTLY NECESSARY COOKIES Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. TARGETING COOKIES Targeting Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. PERFORMANCE COOKIES Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. Back Button COOKIE LIST Search Icon Filter Icon Clear checkbox label label Apply Cancel Consent Leg.Interest checkbox label label checkbox label label checkbox label label Reject All Confirm My Choices