• EXTENDED DETECTION & RESPONSE

    Identity Threat Detection & Response

    Visualize and neutralize threats in your Active Directory instantly

The Active Directory (AD) is a legacy tool that is a priority target for attackers due to its dominant position in the market. It also lacks the ability to detect anomalous configurations, and its interdependence with other information systems often creates vulnerabilities that attackers exploit to move laterally within an organization's IT infrastructure.

Telefónica Tech offers ITDR (Identity Threat Detection & Response) technologies, as well as a team of experts who operate the service from the SOC (present in 12 locations). Analysts investigate, respond, and report on detected threats, advise on risk mitigation due to poor AD configurations or compromised credentials, and propose prevention automation based on dynamic risk conditions.

OUR VALUE PROPOSITION

Our service

Our service provides 24/7/365 monitoring of attacker lateral movements from endpoints or servers to your Active Directory and delivers either guided or fully automated responses—as needed—to remediate attacks via user blocking, forced password resets, or enforced multi-factor authentication (MFA).

Through regular meetings and reports, we offer recommendations for Active Directory hygiene, and we also recommend and deploy preventive automations driven by dynamic risk conditions.

What does it allow?

Gain visibility, severity, and threat risk advice based
on Active Directory configuration.

Detect, investigate, and respond to lateral movements
by attackers within your IT infrastructure that could
compromise Active Directory as preliminary steps in their
attack.

Deploy identity risk prevention automation based on
Zero-Trust guidelines.

BENEFITS FOR YOUR COMPANY

Improved detection and response coverage

The service identifies anomalous user behavior through continuous analysis using machine learning techniques. This helps detect potential Active Directory compromises, such as privilege escalation, domain controller copying, or administrator impersonation.

Automatic prevention that closes entry doors to attackers

The continuous identification and assessment of risks due to misconfigurations, compromised credentials, or weak policies helps protect Active Directory. Privilege changes or inactive users are also detected, contributing to its hygiene.

Advice on best practices for Active Directory configuration

Thanks to automated risk-based access controls, such as one-time MFA requests or blocking access from malicious IPs, identities are protected from suspicious attacker movements. This helps detect and stop unauthorized access attempts by potential attackers.

OUR DIFFERENTIAL VALUE

  • OUR DIFFERENTIAL VALUE 1

    We not only alert and investigate threats, but also propose,
    develop, and audit automated risk-based prevention responses
    to anticipate the attacker’s movements.

  • OUR DIFFERENTIAL VALUE 2

    Our consulting experience will help you prevent future attacks
    by improving the ongoing security posture of Active Directory.

  • OUR DIFFERENTIAL VALUE 3

    Many of our SOC’s operational processes are automated, allowing us to detect, investigate, and respond to threats in a short amount of time.

Related Solutions and Services

Digital Forensics & Incident Response

Cyber incident and cyber crisis response solution to minimise damage and accelerate operational recovery, including dedicated incident management, forensic/malware analysis and assistance with threat containment, recovery and eradication.

More information

SIEM Management

Monitoring and correlation of security events with 24x7 alert management, providing a solid foundation in security threat detection through our global use case catalogue, SOAR and threat intelligence platform.

More information

Unified Endpoint Management

With our Unified Endpoint Management service you can carry out this management with experienced and efficient support or delegate it to us so that you can focus on your business.

More information

Managed Detection & Response

Detection, investigation, and response to security breaches 24x7x365. Plus, proactive threat detection (Threat Hunting) and continuous risk assessment using the most cutting-edge xDR platforms and Telefónica Tech's proprietary developments.

More information

Cloud Security

A security solution designed to identify, assess and manage public cloud threats and challenges with a set of capabilities that support your business by helping you adopt the cloud with confidence.

More information
We want to help you find the perfect solution for your business