www.semperis.com Open in urlscan Pro
75.2.46.245  Public Scan

Submitted URL: https://email.semperis.com/MjM5LUNQTi04NTEAAAGRBAzBF8cg4lun_3FmmO5JNOnW7dJm_1DHviJMnSTXK8A_iazu5vVOlNdf_5h2vvlZCab4K4c=
Effective URL: https://www.semperis.com/blog/swift-ransomware-response-business-resiliency/?mkt_tok=MjM5LUNQTi04NTEAAAGRBAzBF4gXWT2nfNOF...
Submission: On February 03 via api from US — Scanned from US

Form analysis 5 forms found in the DOM

/

<form action="/" __bizdiag="115" __biza="WJ__">
  <div class="input-holder">
    <input type="text" name="s" placeholder="Search" value="">
  </div>
  <button>
    <svg width="14" height="14" viewBox="0 0 14 14" fill="none" xmlns="http://www.w3.org/2000/svg">
      <path
        d="M10.0057 8.80503H9.37336L9.14923 8.58891C9.93368 7.67639 10.4059 6.49171 10.4059 5.20297C10.4059 2.32933 8.07662 0 5.20297 0C2.32933 0 0 2.32933 0 5.20297C0 8.07662 2.32933 10.4059 5.20297 10.4059C6.49171 10.4059 7.67639 9.93368 8.58891 9.14923L8.80503 9.37336V10.0057L12.8073 14L14 12.8073L10.0057 8.80503ZM5.20297 8.80503C3.20983 8.80503 1.60091 7.19611 1.60091 5.20297C1.60091 3.20983 3.20983 1.60091 5.20297 1.60091C7.19611 1.60091 8.80503 3.20983 8.80503 5.20297C8.80503 7.19611 7.19611 8.80503 5.20297 8.80503Z"
        fill="#7B7A7A"></path>
    </svg>
  </button>
</form>

<form id="mktoForm_1164" novalidate="novalidate" class="mktoForm mktoHasWidth mktoLayoutLeft" style="font-family: Helvetica, Arial, sans-serif; font-size: 13px; color: rgb(51, 51, 51); width: 265px;" __bizdiag="2048253403" __biza="WJ__">
  <style type="text/css">
    .mktoForm .mktoButtonWrap.mktoInset .mktoButton {
      color: #000;
      background: #fff;
      border: 1px solid #aeb0b6;
      padding: 0.4em 1em;
      font-size: 1em;
      box-shadow: 1px 1px 6px 1px #ccc;
      background-color: #f5f5f5;
      background-image: -webkit-gradient(linear, left top, left bottom, from(#f5f5f5), to(#dfdfdf));
      background-image: -webkit-linear-gradient(top, #f5f5f5, #dfdfdf);
      background-image: -moz-linear-gradient(top, #f5f5f5, #dfdfdf);
      background-image: linear-gradient(to bottom, #f5f5f5, #dfdfdf);
    }

    .mktoForm .mktoButtonWrap.mktoInset .mktoButton:hover {
      border: 1px solid #999;
    }

    .mktoForm .mktoButtonWrap.mktoInset .mktoButton:focus {
      outline: none;
      border: 1px solid #999;
    }

    .mktoForm .mktoButtonWrap.mktoInset .mktoButton:active {
      box-shadow: inset 1px 1px 6px 1px #ccc;
      background-color: #dfdfdf;
      background-image: -webkit-gradient(linear, left top, left bottom, from(#dfdfdf), to(#f5f5f5));
      background-image: -webkit-linear-gradient(top, #dfdfdf, #f5f5f5);
      background-image: -moz-linear-gradient(top, #dfdfdf, #f5f5f5);
      background-image: linear-gradient(to bottom, #dfdfdf, #f5f5f5);
    }
  </style>
  <div class="mktoFormRow">
    <div class="mktoFieldDescriptor mktoFormCol" style="margin-bottom: 10px;">
      <div class="mktoOffset" style="width: 10px;"></div>
      <div class="mktoFieldWrap mktoRequiredField"><label for="Email" id="LblEmail" class="mktoLabel mktoHasWidth" style="width: 82px;">
          <div class="mktoAsterix">*</div>Business Email
        </label>
        <div class="mktoGutter mktoHasWidth" style="width: 10px;"></div><input id="Email" name="Email" maxlength="255" aria-labelledby="LblEmail InstructEmail" type="email" class="mktoField mktoEmailField mktoHasWidth mktoRequired"
          aria-required="true" style="width: 150px;" placeholder="Email Address"><span id="InstructEmail" tabindex="-1" class="mktoInstruction"></span>
        <div class="mktoClear"></div>
      </div>
      <div class="mktoClear"></div>
    </div>
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow">
    <div class="mktoFormCol" style="margin-bottom: 10px;">
      <div class="mktoOffset mktoHasWidth" style="width: 10px;"></div>
      <div class="mktoFieldWrap">
        <div class="mktoHtmlText mktoHasWidth" style="width: 260px;"><span style="color: #808080; font-size: 10px;">By submitting, you agree that Semperis may use and process your personal information to send you information regarding its products
            and services in accordance with the Semperis <a href="https://www.semperis.com/privacy-policy/" target="_blank" id="" style="color: #808080;">Privacy Policy</a>. You can opt out at any time.</span></div>
        <div class="mktoClear"></div>
      </div>
      <div class="mktoClear"></div>
    </div>
    <div class="mktoClear"></div>
  </div>
  <script src="https://www.google.com/recaptcha/api.js?onload=captchaCallback" type="text/javascript" async="async" defer="defer"></script>
  <div>
    <script type="text/javascript">
      var formId = 1164;
      var captchaCallback = function(a) {
        var b = document.getElementsByClassName("grecaptcha-badge");
        if (b.length > 0)
          for (var c = 0; c < b.length; c++) b[c].style.visibility = "hidden";
        if (a) {
          var d = this.MktoForms2.getForm(formId);
          d && d.setCaptchaValue(a)
        }
      };
    </script>
  </div>
  <div id="captcha" class="g-recaptcha" data-callback="captchaCallback" data-expired-callback="captchaExpired" data-sitekey="6LcMmSEnAAAAAJo5LvnKfpW3sC9NbOOvVXI0yOPY" data-size="invisible">
    <div class="grecaptcha-badge" data-style="bottomright"
      style="width: 256px; height: 60px; display: block; transition: right 0.3s ease 0s; position: fixed; bottom: 14px; right: -186px; box-shadow: gray 0px 0px 5px; border-radius: 2px; overflow: hidden; visibility: hidden;">
      <div class="grecaptcha-logo"><iframe title="reCAPTCHA" width="256" height="60" role="presentation" name="a-lxfasdbhkes0" frameborder="0" scrolling="no"
          sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox allow-storage-access-by-user-activation"
          src="https://www.google.com/recaptcha/api2/anchor?ar=1&amp;k=6LcMmSEnAAAAAJo5LvnKfpW3sC9NbOOvVXI0yOPY&amp;co=aHR0cHM6Ly93d3cuc2VtcGVyaXMuY29tOjQ0Mw..&amp;hl=en&amp;v=MHBiAvbtvk5Wb2eTZHoP1dUd&amp;size=invisible&amp;cb=qshi3xl4egqp"></iframe>
      </div>
      <div class="grecaptcha-error"></div><textarea id="g-recaptcha-response" name="g-recaptcha-response" class="g-recaptcha-response"
        style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
    </div>
  </div>
  <div class="mktoCaptchaDisclaimer">This site is protected by reCAPTCHA and the Google <a href="https://policies.google.com/privacy" target="_blank">Privacy Policy</a> and
    <a href="https://policies.google.com/terms" target="_blank">Terms of Service</a> apply.</div>
  <div class="mktoButtonRow"><span class="mktoButtonWrap mktoInset" style="margin-left: 120px;"><button type="submit" class="mktoButton button"><span data-label="Submit"><span>Submit</span></span></button></span></div><input type="hidden"
    name="formid" class="mktoField mktoFieldDescriptor" value="1164"><input type="hidden" name="munchkinId" class="mktoField mktoFieldDescriptor" value="239-CPN-851">
</form>

<form id="mktoForm_1039" __bizdiag="196351687" __biza="WJ__" novalidate="novalidate" class="mktoForm mktoHasWidth mktoLayoutLeft" style="font-family: Helvetica, Arial, sans-serif; font-size: 13px; color: rgb(51, 51, 51); width: 265px;">
  <style type="text/css">
    .mktoForm .mktoButtonWrap.mktoInset .mktoButton {
      color: #000;
      background: #fff;
      border: 1px solid #aeb0b6;
      padding: 0.4em 1em;
      font-size: 1em;
      box-shadow: 1px 1px 6px 1px #ccc;
      background-color: #f5f5f5;
      background-image: -webkit-gradient(linear, left top, left bottom, from(#f5f5f5), to(#dfdfdf));
      background-image: -webkit-linear-gradient(top, #f5f5f5, #dfdfdf);
      background-image: -moz-linear-gradient(top, #f5f5f5, #dfdfdf);
      background-image: linear-gradient(to bottom, #f5f5f5, #dfdfdf);
    }

    .mktoForm .mktoButtonWrap.mktoInset .mktoButton:hover {
      border: 1px solid #999;
    }

    .mktoForm .mktoButtonWrap.mktoInset .mktoButton:focus {
      outline: none;
      border: 1px solid #999;
    }

    .mktoForm .mktoButtonWrap.mktoInset .mktoButton:active {
      box-shadow: inset 1px 1px 6px 1px #ccc;
      background-color: #dfdfdf;
      background-image: -webkit-gradient(linear, left top, left bottom, from(#dfdfdf), to(#f5f5f5));
      background-image: -webkit-linear-gradient(top, #dfdfdf, #f5f5f5);
      background-image: -moz-linear-gradient(top, #dfdfdf, #f5f5f5);
      background-image: linear-gradient(to bottom, #dfdfdf, #f5f5f5);
    }
  </style>
  <div class="mktoFormRow">
    <div class="mktoFieldDescriptor mktoFormCol" style="margin-bottom: 10px;">
      <div class="mktoOffset" style="width: 10px;"></div>
      <div class="mktoFieldWrap mktoRequiredField"><label for="Email" id="LblEmail" class="mktoLabel mktoHasWidth" style="width: 82px;">
          <div class="mktoAsterix">*</div>Business Email
        </label>
        <div class="mktoGutter mktoHasWidth" style="width: 10px;"></div><input id="Email" name="Email" placeholder="Business Email" maxlength="255" aria-labelledby="LblEmail InstructEmail" type="email"
          class="mktoField mktoEmailField mktoHasWidth mktoRequired" aria-required="true" style="width: 150px;"><span id="InstructEmail" tabindex="-1" class="mktoInstruction"></span>
        <div class="mktoClear"></div>
      </div>
      <div class="mktoClear"></div>
    </div>
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow">
    <div class="mktoFormCol" style="margin-bottom: 10px;">
      <div class="mktoOffset mktoHasWidth" style="width: 10px;"></div>
      <div class="mktoFieldWrap">
        <div class="mktoHtmlText mktoHasWidth" style="width: 260px;"><span style="color: #808080; font-size: 10px;">By submitting, you agree that Semperis may use and process your personal information to send you information regarding its products
            and services in accordance with the Semperis <a href="https://www.semperis.com/privacy-policy/" target="_blank" id="" style="color: #808080;">Privacy Policy</a>. You can opt out at any time.</span></div>
        <div class="mktoClear"></div>
      </div>
      <div class="mktoClear"></div>
    </div>
    <div class="mktoClear"></div>
  </div>
  <script src="https://www.google.com/recaptcha/api.js?onload=captchaCallback" type="text/javascript" async="async" defer="defer"></script>
  <div>
    <script type="text/javascript">
      var formId = 1039;
      var captchaCallback = function(a) {
        var b = document.getElementsByClassName("grecaptcha-badge");
        if (b.length > 0)
          for (var c = 0; c < b.length; c++) b[c].style.visibility = "hidden";
        if (a) {
          var d = this.MktoForms2.getForm(formId);
          d && d.setCaptchaValue(a)
        }
      };
    </script>
  </div>
  <div id="captcha" class="g-recaptcha" data-callback="captchaCallback" data-expired-callback="captchaExpired" data-sitekey="6LcMmSEnAAAAAJo5LvnKfpW3sC9NbOOvVXI0yOPY" data-size="invisible">
    <div class="grecaptcha-badge" data-style="none" style="width: 256px; height: 60px; position: fixed; visibility: hidden;">
      <div class="grecaptcha-logo"><iframe title="reCAPTCHA" width="256" height="60" role="presentation" name="a-7cvc7tyizi8i" frameborder="0" scrolling="no"
          sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox allow-storage-access-by-user-activation"
          src="https://www.google.com/recaptcha/api2/anchor?ar=1&amp;k=6LcMmSEnAAAAAJo5LvnKfpW3sC9NbOOvVXI0yOPY&amp;co=aHR0cHM6Ly93d3cuc2VtcGVyaXMuY29tOjQ0Mw..&amp;hl=en&amp;v=MHBiAvbtvk5Wb2eTZHoP1dUd&amp;size=invisible&amp;cb=b37x42p6k74z"></iframe>
      </div>
      <div class="grecaptcha-error"></div><textarea id="g-recaptcha-response-1" name="g-recaptcha-response" class="g-recaptcha-response"
        style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
    </div><iframe style="display: none;"></iframe>
  </div>
  <div class="mktoCaptchaDisclaimer">This site is protected by reCAPTCHA and the Google <a href="https://policies.google.com/privacy" target="_blank">Privacy Policy</a> and
    <a href="https://policies.google.com/terms" target="_blank">Terms of Service</a> apply.</div>
  <div class="mktoButtonRow"><span class="mktoButtonWrap mktoInset" style="margin-left: 120px;"><button type="submit" class="mktoButton button"><span data-label="Submit"><span>Submit</span></span></button></span></div><input type="hidden"
    name="formid" class="mktoField mktoFieldDescriptor" value="1039"><input type="hidden" name="munchkinId" class="mktoField mktoFieldDescriptor" value="239-CPN-851">
</form>

<form novalidate="novalidate" class="mktoForm mktoHasWidth mktoLayoutLeft" style="font-family: Helvetica, Arial, sans-serif; font-size: 13px; color: rgb(51, 51, 51); visibility: hidden; position: absolute; top: -500px; left: -1000px; width: 1600px;"
  __bizdiag="-2121169767" __biza="WJ__"></form>

<form __bizdiag="-2121169767" __biza="WJ__" novalidate="novalidate" class="mktoForm mktoHasWidth mktoLayoutLeft"
  style="font-family: Helvetica, Arial, sans-serif; font-size: 13px; color: rgb(51, 51, 51); visibility: hidden; position: absolute; top: -500px; left: -1000px; width: 1600px;"></form>

Text Content

Press Alt+1 for screen-reader mode, Alt+0 to cancelAccessibility Screen-Reader
Guide, Feedback, and Issue Reporting
Semperis Named to Fortune Magazine’s Cyber 60 List of Fastest Growing
Cybersecurity Startups
 * Why Semperis
   WHY SEMPERIS
    * Tour the Identity Resilience PlatformHybrid AD attack prevention,
      detection, response, and recovery
    * Our CustomersLearn why industry-leading organizations trust Semperis
    * Our Unrivaled AD Security ExpertiseNo other vendor can outmatch Semperis’
      collective Microsoft MVP experience in Directory Services and Group Policy
    * Purple Knight ArsenalCheck out our free community tools built by and for
      AD security pros
    * Hybrid Identity Protection (HIP) ConferenceAttend the award-winning
      conference series for identity-first security practitioners
   
   INDUSTRY Verticals
    * Critical Infrastructure
    * Financial services
    * Healthcare
    * Insurance
    * Retail
    * Public Sector
    * Transportation
   
   SEMPERIS MAKES THE DELOITTE TECH FAST 500 LIST THREE YEARS IN A ROW
   
   Semperis ranks in the top 15% with three-year revenue growth of over 2,800%
   
   Read the news
   Back
 * Identity Resilience Platform
   PLATFORM PRODUCTS
    * Directory Services ProtectorHybrid AD threat prevention, detection, and
      response
    * Active Directory Forest RecoveryCyber-first AD disaster recovery
    * Migrator for ADSecurity-first AD migration and consolidation
    * Disaster Recovery for Entra TenantBackup and recovery for Entra ID
      resources
    * Purple KnightCommunity tool: Hybrid AD security assessment
    * Forest DruidTier 0 attack path discovery
   
   SOLUTIONS
    * AD Migration & Consolidation
    * AD Attack Surface Reduction
    * Tier 0 Attack Path Analysis
    * AD Threat Detection & Response
    * AD Change Auditing & Rollback
    * AD Backup & Recovery
    * Active Directory Breach Forensics
    * Breach Preparedness & Response Services
   
   SEMPERIS RANKS TOP FIVE FASTEST GROWING CYBERSECURITY COMPANIES IN AMERICA
   
   Semperis named to the INC. 500 list for the second consecutive year
   
   Tour our platform products
   Back
 * Partners
   PARTNER WITH SEMPERIS
    * Partner OverviewLearn about Semperis' 100% channel sales approach,
      guaranteed margins, and free security assessment tools for partners
    * Find a PartnerSearch our vast partner network
    * Partner Portal
    * Become a Partner
   
    * Request access to Purple Knight post-breach partner edition
   
   SEMPERIS WINS CRN’S PRESTIGIOUS PARTNER PROGRAM GUIDE TWO CONSECUTIVE YEARS
   
   Designation highlights Semperis’ innovative alliances with global solution
   providers that help organizations protect hybrid identity environments from
   cyberattacks
   
   Partner Overview
   Back
 * Resources
   Resource hub
    * AD Security Glossary
    * Blog
    * Case Studies
    * Reports
    * Videos
    * Webinars
    * White Papers
   
    * Purple Knight Docs
   
   THE CISO'S TAKE ON IDENTITY-FIRST SECURITY FEATURING SIMON HODGKINSON
   
   Watch now
    * Visit our video channel
    * Tune in to our HIP Podcast
   
   Back
 * Company
    * About Us
    * Awards
    * Careers
    * Contact Us
    * Events
    * FAQ
   
    * In the News
    * Life at Semperis
    * Newsroom
    * Press Releases
   
    * Open positions
    * Request a demo
   
   SEMPERIS NAMED TO FORTUNE MAGAZINE'S 2023 CYBER 60 LIST'
   
   Find out more
   Back

REQUEST A DEMO
EXPERIENCING A BREACH?

 * Blog
 * Contact Us
 * Support
 * English
    * Deutsch
    * Español
    * Français
    * Italiano
    * Português

REQUEST A DEMO
EXPERIENCING A BREACH?
Back to all news


A SWIFT RANSOMWARE RESPONSE IS THE PATH TO BUSINESS RESILIENCY

 * Active Directory Backup & Recovery
 * Dec 22, 2023
 * Read 4 MIN

Mickey Bresman CEO, Semperis

Cyberattacks on business systems—including hybrid identity systems—continue to
make headlines, including recent breaches targeting healthcare company Henry
Schein and hospitality conglomerate MGM Resorts. Apart from these
well-publicized attacks, the Semperis Breach Preparedness & Response Services
team has seen a spike in requests from our customers (and our partners’
customers) to help them recover from identity-related attacks.

During these incident response (IR) engagements, I’ve observed stark differences
in the recovery time and the impact it has on various organizations, which got
me thinking about the resiliency level of these companies. What is the
difference between a company that bounces back in a relatively short amount of
time after an identity-related attack versus a company whose recovery drags on
for days or weeks, incurring huge costs to the organization? From my firsthand
experience, I’ve concluded that the biggest difference is the organization’s
ability to orchestrate, automate, and test the recovery process.


BACKUPS ARE ONLY THE BEGINNING

Having backups is of course an essential starting point for business recovery.
Although this shouldn’t be the case today, some companies still struggle with
offline/offsite backup policies and procedures. In the case of a cyberattack
that takes down the Active Directory environment, we’ve often seen that the
first encryption target is the backup and recovery server on the company
network. Once the attackers successfully encrypt the backup system, they move on
to encrypt the rest of the organization.

Recommendation: Make sure you have offline/offsite backups that cannot be
accessed by using the same credentials as the rest of your production network.


THE RECOVERY PROCESS CAN BE A STUMBLING BLOCK

A convoluted recovery procedure also can delay the return to normal business
operations. The best approach for recovery is “practice makes progress.” In many
IR cases we’re pulled into, the biggest portion of the recovery timeline is
spent on getting the right people to approve the recovery process. But other
aspects of the recovery that seem obvious—such as maintaining an offline list of
key contacts and organizing shift schedules for expert responders—also are
overlooked, which adds complication to an inherently chaotic situation.

Gartner analysts Wayne Hankins and Craig Porter recently pointed out the
importance of speed in recovering from a ransomware attack: “CISOs responsible
for preparing for ransomware attacks must build resilience by developing a
containment strategy they can execute during a ransomware attack. Failure to do
so will increase the risk of uncoordinated and ineffective response, prolonging
the recovery time.”

Although Gartner doesn’t provide specific instructions on how to build the
recovery playbook, I can attest that the more details an organization captures,
the faster the recovery will go. Uncovering those details requires practicing
every step of the recovery journey.

Recommendation: Make sure you have a well-documented IR procedure that provides
details about all aspects of the recovery process—and verify that this
information can be accessed even if the network is down. Basic information
(we’ll publish a more comprehensive list in the future and link to it here)
includes:

 * Who needs to approve various steps in the process—for example, who can
   authorize initiating the Active Directory recovery procedure?
 * Who are your key vendors (this list might be different for an IR case as
   compared to vendors for normal IT operations), and where is their contact
   information?
 * What SLAs are in place with your vendors?


TIME IS THE CRITICAL FACTOR IN RECOVERY SUCCESS

After we’ve retrieved the backups and the recovery procedure has been approved,
the next challenge is time. Time is the one factor that is working against you.
I would argue that given enough time and access to valid backups, any
environment can be recovered. But extensive time to recover can cause
irreparable harm to the organization. There is a direct connection between
operational downtime and the damage cost to the organization. While it’s not
common for recovery efforts to fail completely, the costs associated with
excessive downtime can be devastating.

Accurately assessing the all-in costs of downtime is notoriously difficult, and
the final tally will vary based on the size of the organization and the
industry. Gartner’s 2014 estimate that IT downtime costs organizations, on
average, $5,600 a minute is still used as a benchmark. Gartner recently reported
that costs for recovering from ransomware attacks in particular rose 20% in 2023
compared to 2022.

But again, downtime costs can vary wildly: According to Forbes, the average
automotive manufacturer loses $22,000 per minute when the production line stops.
The relevant question is not what the industry average downtime cost is. The
important consideration is how much downtime will cost your organization—not
only in hard costs but also in reputational, legal, and regulatory damages.

Recommendation: Make sure you orchestrate and automate as much of the recovery
process as possible. Orchestrated recovery with complex systems can make the
difference between days and weeks of recovery time versus minutes and hours. For
instance, it took Maersk nine days just to recover their Active Directory
following the NotPetya attack. In the same environment, but with an orchestrated
solution, the time to recover can be reduced to 30 minutes.


POST-BREACH SECURITY PREVENTS FOLLOW-ON ATTACKS

Once the recovery has been completed, ensuring the environment is secured and
can be trusted is the last major effort in the recovery process. The last thing
that you want is to expose the recovered environment too soon, which could open
the door for attackers to immediately return and take it down again. You need to
identify and eradicate lingering malware before returning systems to production.

Recommendation: Make sure your IR process includes a well-defined process for
securing the environment post recovery. The procedure should include scanning
all systems for indicators of exposure (IOEs), indicators of compromise (IOCs),
and potential indicators of attack (IOAs).


FOCUS ON REDUCING DOWNTIME TO IMPROVE CYBER RESILIENCY

Preparing for the worst-case scenario is the first step in ensuring your
organization can survive a cyber disaster. The number and severity of attacks on
organizations of every size, every vertical market, and every geographic
location rises with each passing month.

Based on my experience in helping organizations recover from devastating
attacks, I urge every business leader to prioritize developing a fully tested,
cyber-first disaster recovery plan. Although you can’t prevent every
cyberattack, you can dramatically reduce the time to recover. That reduced
downtime could be the factor that determines whether your business survives.


MORE RESOURCES

 * 4 Reasons to Increase Recoverability of Entra ID Resources – Semperis
 * How to Defend Against MFA Fatigue Attacks: Semperis AD 101
 * Active Directory Security Best Practices | Semperis


SIGN UP FOR THE LATEST SEMPERIS NEWS

*
Business Email




By submitting, you agree that Semperis may use and process your personal
information to send you information regarding its products and services in
accordance with the Semperis Privacy Policy. You can opt out at any time.





This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of
Service apply.
Submit

 * AD threat detection & response
   
   Directory Services Protector

 * Cyber-first AD disaster recovery
   
   Active Directory Forest Recovery

 * Security-first AD migration and consolidation
   
   Migrator for Active Directory

 * Backup and recovery for Entra ID resources
   
   Disaster Recovery for Entra Tenant

 * Hybrid AD security assessment
   
   Purple Knight

 * Tier 0 attack path discovery
   
   Forest Druid

 * Why Semperis
   * Tour the Platform
   * Our Customers
 * Solutions
   * AD Migration & Consolidation
   * AD Attack Surface Reduction
   * Tier 0 Attack Path Analysis
   * AD Threat Detection & Response
   * AD Backup & Recovery
   * AD Change Auditing & Rollback
   * Breach Preparedness & Response Services
   * Active Directory Breach Forensics

 * Resources
   * Blog
   * Case Studies
   * Reports
   * Videos
   * White Papers
 * Industry
   * Critical Infrastructure
   * Financial Services
   * Healthcare
   * Insurance
   * Public Sector
   * Retail
   * Transportation
 * Partners
   * Partner Overview
   * Find a Partner
   * Become a Partner

 * Company
   * About Us
   * Careers
   * Events
   * Life at Semperis
   * FAQ
   * Support
 * Newsroom
   * Awards
   * Press Releases
   * In the News
 * Request a Demo
 * Experiencing a Breach?
 * Active Directory Security

Stay Current with Semperis

Sign up for updates.

*
Business Email




By submitting, you agree that Semperis may use and process your personal
information to send you information regarding its products and services in
accordance with the Semperis Privacy Policy. You can opt out at any time.





This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of
Service apply.
Submit
 * 
 * 

© 2024 Semperis. All Rights Reserved.

 * Privacy policy
 * Terms of use









By clicking “Accept All Cookies”, you agree to the storing of cookies on your
device to enhance site navigation, analyze site usage, and assist in our
marketing efforts. For more information, see our Privacy Policy.
Cookies Settings Options Accept All Cookies


Your Opt Out Preference Signal is Honored


PRIVACY PREFERENCE CENTER

When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies. This information might be about you,
your preferences or your device and is mostly used to make the site work as you
expect it to. The information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies. Click on the
different category headings to find out more and change our default settings.
However, blocking some types of cookies may impact your experience of the site
and the services we are able to offer.
More information
User ID: e94e5c0e-11d7-41d4-a8f0-6b931698a9dc
Allow All


MANAGE CONSENT PREFERENCES

FUNCTIONAL COOKIES

Functional Cookies

These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages. If you do not allow these cookies then some
or all of these services may not function properly.

STRICTLY NECESSARY COOKIES

Always Active

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms. You can set your browser to block
or alert you about these cookies, but some parts of the site will not then work.
These cookies do not store any personally identifiable information.

TARGETING COOKIES

Targeting Cookies

These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites. They do not store directly personal
information, but are based on uniquely identifying your browser and internet
device. If you do not allow these cookies, you will experience less targeted
advertising.

PERFORMANCE COOKIES

Performance Cookies

These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site. All
information these cookies collect is aggregated and therefore anonymous. If you
do not allow these cookies we will not know when you have visited our site, and
will not be able to monitor its performance.

Back Button


COOKIE LIST



Search Icon
Filter Icon

Clear
checkbox label label
Apply Cancel
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

Reject All Confirm My Choices