ITDR
Identity Protection
Zscaler ITDR™ protects users with continuous visibility into identity misconfigurations and risky permissions. Detect and stop identity-based attacks such as credential theft, multifactor authentication bypass, and privilege escalation.
Identity is the new attack surface
With the rapid adoption of zero trust, attackers are targeting users and identities as the point of entry and using this access to escalate privileges and move laterally.
Strengthens your zero trust posture by mitigating the risks of user compromise and privilege exploitation
Quantify identity risk
Find misconfigurations
Remediate issues
Monitor in real time
Detect identity attacks
Contain identity threats
What’s Inside
Set up in 5 mins, and get your first assessment in 30 mins
Set up an assessment from a domain-joined machine running Zscaler Client Connector
Turn on detectors for identity attacks on all endpoints
Remediate misconfigurations found in the identity assessment
Continue monitoring for new misconfigurations in real time
Comprehensive protection for identity, an increasingly exploitable attack vector
- Unified risk scoring for identity posture quantification and tracking
- A real-time view of top identity issues and the riskiest users/hosts
- MITRE ATT&CK mapping for visibility into security blindspots
- Identification of new vulnerabilities and misconfigurations as they emerge
- Real-time alerting for new risks introduced to your identity store
- Ready-made guidance, commands, and scripts for remediation
- Detection for attacks targeting your identity store
- Prevention of Kerberoast, DCSync, and LDAP enumeration attacks
- Built-in containment using zero trust access policy
Vorteile der Zero Trust Exchange für Ihr Unternehmen
Eine zentrale Plattform zur Sicherung, Vereinfachung und Transformation Ihres Unternehmens
01 Risikomanagement
Verwertbare Einblicke zur Reduzierung von Risiken und Abwehr von Sicherheitsverletzungen mit einer einheitlichen Plattform
02 Schutz vor Cyberbedrohungen
Schutz für User, Geräte und Workloads vor Kompromittierungen und lateraler Ausbreitung von Bedrohungen
03 Datenschutz
Lückenlose TLS/SSL-Überprüfung für durchgehenden Datenschutz auf der gesamten SSE-Plattform
04 Zero Trust für Zweigstelle und Cloud
Verbinden Sie User, Geräte und Workloads zwischen und innerhalb von Zweigstellen, Cloud und Rechenzentrum