• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
Latest News

SpecterOps Launches BloodHound Enterprise to Improve Active Directory Security for the Enterprise

July 27, 2021 TechDecisions Staff

New Attack Path Management solution from the creators of the open-source tool BloodHound enables organizations to quickly eliminate and manage critical Active Directory Attack Paths

SEATTLE–(BUSINESS WIRE)–SpecterOps, a provider of adversary-focused cybersecurity solutions and the creators of the free and open-source penetration testing tool BloodHound, today announced BloodHound Enterprise, an Attack Path Management (APM) security solution for Active Directory (AD). Designed to help organizations proactively and continuously identify, manage and remediate millions of AD Attack Paths, BloodHound Enterprise gives IT Ops and SecOps professionals the tools needed to dramatically and measurably improve AD security posture with minimal effort.

As a largely unseen, unmanaged and growing problem for enterprises, AD Attack Paths are used by attackers to gain control of systems and data, impersonate users, abuse legitimate access to non-AD systems and much more. This problem is compounded by mountains of misconfiguration debt in AD, making it difficult to create a strong security posture for AD security. Until BloodHound Enterprise there has not been a practical defensive tool that identifies and quantifies AD choke points, eliminating Active Directory as an attacker’s easiest, most reliable and biggest payoff target.

“Traditional approaches to AD security generate massive lists of generic misconfigurations and poor user behaviors that overwhelm teams and are generally impossible to resolve,” said David McGuire, CEO at SpecterOps. “In contrast, BloodHound Enterprise continuously identifies the critical Attack Path ‘choke points’ for elimination, visually illustrates the Attack Paths for contextual understanding, and prioritizes which Attack Paths to eliminate based on actual risk.”

Microsoft AD provides identity and access management, endpoint management and business application management. It is an extremely high-value target for attackers because it is widely used and because it offers features that can give attackers the “keys to the kingdom” if compromised. Attack Paths are chains of abusable privileges and user behaviors that create direct and indirect connections between computers and users within AD. Once an attacker compromises a system or device, they can use the privileges of those users to compromise other systems or devices until they reach their final objective. AD controls which users have access to which systems, so configuring AD correctly can close off these Attack Paths – if the organization is aware they exist.

Active Directory best practices such as least privilege access and tiered administration are almost never implemented correctly or at all, and Attack Paths are too numerous and dynamic for reactive security measures to be effective. BloodHound Enterprise solves these problems with:

  • Rapid, centralized cloud deployment in under an hour that allows IT Ops and SecOps teams to deploy across corporate and subsidiary locations to understand Attack Path risk quickly.
  • Continuous, comprehensive Attack Path mapping that enumerates every possible path and highlights new paths introduced through configuration changes and user behaviors.
  • Attack Path Choke Point identification with analysis of impact that allows teams to better prioritize remediation.
  • Practical, precise and safe remediation guidance that leads teams through remediations step-by-step to sever Attack Paths without significant architecture revisions and avoiding disruptions to business operations.
  • Quantifiable security posture improvement with the ability to report on Attack Path exposure of high value targets.

BloodHound Enterprise is distinct from BloodHound FOSS and SpecterOps remains fully committed to supporting BloodHound FOSS.

For more detailed product information on BloodHound Enterprise, or to receive a demo, click here.

About SpecterOps

SpecterOps is a provider of adversary-focused cybersecurity solutions and is the creator of the BloodHound free and open-source penetration testing solution, which maps relationships in an Active Directory environment. BloodHound has been recommended by the Department of Homeland Security, PricewaterhouseCoopers and many more. BloodHound Enterprise is the company’s first defense solution for enterprise SOC teams and defenders. For more information on the company and its solutions, visit https://specterops.io/.

Contacts

Media Contact
Austin Williams

Voxus PR for SpecterOps

[email protected]
253-441-0154

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Related Content:

  • Virgin Media O2 Partners with VMware to Complete…
  • SEON Expands Advanced Digital Device Fingerprinting to Counter…
  • Akumina Announces 86% Year-over-Year SaaS Bookings Growth as…
  • Skykit Survey: Sharing Data Dashboards Broadly with Employees…

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.