Back to Resources
Identity Resources
Showing 24 Results
Deception for Inside-the-Network Threat Detection
Protecting Against Credential-Based Attacks
Gain Control of Your Attack Surface with XDR and Identity
Deception: The Secret Weapon Against Identity-Based Attacks
Eagers Automotive Chooses SentinelOne Singularity Hologram To Improve Its Cybersecurity Posture
Eagers Automotive Chooses SentinelOne Ranger AD to Better Secure Its Active Directory
The Role of Identity Compromise in Recent Breaches
Choosing an Active Directory Visibility Solution
Endpoint Credential Theft: How to Prevent and Tackle The Adversary Head-On
Dynamic Deception for Industrial Automation and Control Systems
Deception Technology: A Critical Component of a Modern Cybersecurity Stack
Defending Against Identity-Based Attacks
Preventing In-Network Lateral Movement Attacks with Identity Security
Top 5 Ways to Protect Your Active Directory from Ransomware Attacks
Protecting your Identity Attack Surface
Identity Security Questionnaire
Active Directory Security Checklist
How CISOs Empower Enterprises to Develop Robust Identity Security Programs
Rise of Identity Based Attacks: How to Efficiently Protect Your Enterprise
Singularity™ Identity Vs. Browser Credential Harvesting (Prevention and Deception)
Singularity Ranger AD Assessor
Singularity Identity
Singularity Hologram
Singularity App for Azure Active Directory
Webinar
5 Best Practices for Implementing XDR