The Market's First Identity & Access Threat Prevention Platform
The Preempt Platform
Identity and Access Threat Prevention to Continuously Preempt Threats
The Preempt Platform provides Identity and Access Threat Prevention to help enterprises continuously preempt threats and gain a holistic and continuous view of identity, behavior and risk across all platforms (on premise, cloud and hybrid).
This modern approach breaks away the silos of solutions and pulls it all together from a threat perspective. Organizations can now automatically respond in real-time to anomalous behavior, proactively add secure access control and resolve risk and weaknesses before they are exploited by attackers. Best of all, Preempt improves security team efficiency. Some customers find they can respond to incidents 2-3x faster than the could before. Download data sheet here.
Real-time Adaptive Threat Prevention
What if you could preempt threats before impact?
When suspicious or risky behavior is detected, Preempt stops threats without getting an analyst involved or disrupting valid users. Policy-based responses (e.g. Block, MFA, Isolation, reduce privileges, alert, etc) continually adapt based on identity, behavior and risk.
Preempt also helps organizations detect, isolate, control and contain reconnaissance and attack tools (Mimikatz, PowerShell, PsExec, Bloodhound) as well as the ability to deeply inspect authentication protocol usage (NTLM, DCE/RCP, Kerberos, LDAP) in real-time. These capabilities reduce the risk of improper tool use, credential forwarding, password cracking and other credential-based attacks such as Pass-the-Hash and Golden Ticket.
Unified and Continuous Visibility
What if you could get rid of the silos?
One pane of glass for all user activity across all platforms (on premise, cloud and hybrid) including access, behavior, history, profile changes, locations, device, role, password strength, privileges, VPN, SSO, authentication requests and more. Preempt analyzes real-time traffic and logs to understand behavior and revel risks (stealthy admins, hidden objects, exposed passwords, weak passwords, stale users, privileged users, etc.). Visibility allows for better controlling privileged accounts, responding to incidents, more efficient audits and more.
Preempt Platform Applications
Implement IATP at the pace and scale that works best
Preempt Platform delivers a scalable set of applications to implement Identity and Access Threat Prevention at a pace and scale that works best for customer’s use cases. The applications include:
- Behavioral Firewall:
Real-time, automated and adaptive threat detection and prevention on any network resource
- Any App:
Immediate protection of any resources with policy based enforcement and/or adding MFA to any application
Unified visibility of all accounts across all platforms allows security teams to analyze risks and weaknesses and resolve them before they are exploited
- Threat Hunter:
Proactive tools to search all activity, detect and identify security events or further investigate reported events.
- Secure Federated Access:
Comprehensive and consistent visibility and enforcement for cloud-based assets.
With an open and extensible architecture, Preempt delivers consistent security and user experience across on prem, cloud or hybrid environments. With a broad set of integrations, organizations gain more value out of security investments that have already been made and gain more intelligence for greater context and enforcement.
Immediate and Ongoing Value
Not only does it take minimal time and effort to install and maintain but once installed you can immediately reduce attack surface. Preemptive blocking and automated resolution of incidents reduces risk and can resolve threats 2-3x faster. Less false positives. Faster threat hunting. Happier security teams.
Industry Leading Research
Preempt’s dedicated security research team is constantly working to stay ahead of emerging risks. Their deep expertises of authorization and authentication protocols has helped them identify several critical Microsoft vulnerabilities and the team has been recognized and by the cyber industry as an innovative thought leader.